Chapter 7. Basic Linux Exploits
In this chapter we will cover basic Linux exploit concepts.
Stack operations
Stack data structure
How the stack data structure is implemented
Procedure of calling functions
Buffer overflows
Example of a buffer overflow
Overflow of previous meet.c
Ramifications of buffer overflows
Local buffer overflow exploits
Components of the “exploit sandwich”
Exploiting stack overflows by command line and generic code
Exploitation of meet.c
Exploiting small buffers by using the environment segment of memory
Exploit development process
Control eip
Determine the offset(s)
Determine the attack vector
Build the exploit sandwich
Test the exploit
Why study exploits? Ethical hackers should study exploits to understand if a vulnerability is exploitable. ...
Get Gray Hat Hacking, Second Edition, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.