equal
deleted
inserted
replaced
689 \begin{center} |
689 \begin{center} |
690 \url{http://www.mgraziano.info/docs/stsi2010.pdf} |
690 \url{http://www.mgraziano.info/docs/stsi2010.pdf} |
691 \end{center} |
691 \end{center} |
692 |
692 |
693 \noindent updates, as the name says, most information to 2010. |
693 \noindent updates, as the name says, most information to 2010. |
694 There are also sources for buffer overflow attack in |
694 There is another Phrack article about return-into-lib(c) exploits |
|
695 from 2012: |
|
696 |
|
697 \begin{center} |
|
698 \url{http://phrack.org/issues/58/4.html} |
|
699 \end{center} |
|
700 |
|
701 \noindent |
|
702 The main topic is about getting around the non-executability of stack |
|
703 data (in case it is protected). This article gives some further |
|
704 pointers into the recent literature about buffer overflow attacks. |
|
705 |
|
706 Buffer overflow attacks are not just restricted to Linux and |
|
707 ``normal'' computers. There is a book |
|
708 |
|
709 \begin{quote}\rm |
|
710 ``iOS Hacker's Handbook'' by Miller et al, Wiley, 2012 |
|
711 \end{quote} |
|
712 |
|
713 \noindent |
|
714 which seem to describe buffer overflow attacks on iOS. A book from the |
|
715 same publisher exists also for Android (from 2014) which seem to also |
|
716 feature buffer overflow attacks. Alas I do not own copies of these |
|
717 books. |
695 |
718 |
696 |
719 |
697 \subsubsection*{A Crash-Course for GDB} |
720 \subsubsection*{A Crash-Course for GDB} |
698 |
721 |
699 If you want to try out the examples from KEATS it might be |
722 If you want to try out the examples from KEATS it might be |