Chapter 7. Basic Linux Exploits

In this chapter we will cover basic Linux exploit concepts.

  • Stack operations

    • Stack data structure

    • How the stack data structure is implemented

    • Procedure of calling functions

  • Buffer overflows

    • Example of a buffer overflow

    • Overflow of previous meet.c

    • Ramifications of buffer overflows

  • Local buffer overflow exploits

    • Components of the “exploit sandwich”

    • Exploiting stack overflows by command line and generic code

    • Exploitation of meet.c

    • Exploiting small buffers by using the environment segment of memory

  • Exploit development process

    • Control eip

    • Determine the offset(s)

    • Determine the attack vector

    • Build the exploit sandwich

    • Test the exploit

Why study exploits? Ethical hackers should study exploits to understand if a vulnerability is exploitable. ...

Get Gray Hat Hacking, Second Edition, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.