Vulnerability Development mailing list archives
Analysis of the Exploitation Processes (.pdf)
From: Steven Hill <steve () covertsystems org>
Date: Tue, 23 Mar 2004 20:15:58 +1100
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello, "Analysis of the Exploitation Processes" (.pdf) "Covert Systems Research" has drafted together a tutorial defining several of the common types of vulnerabilities together with their counterpart command line exploit sequences. The descriptions of these types of vulnerabilities range from stack to heap, function pointer and format string weaknesses. This draft holds reasonably documented methods to exploitation of those types of vulnerabilites through the use of several command line exploit sequences. This will provide the exploit developer a more in-depth understanding of how an exploitation method works. Given this information, a Proof-of-Concept code should be easier to develop while also giving the reader a greater satisfaction, upon its creation. This whitepaper has been developed to help those seeking to improve their exploitation skills while also aiming to give the reader the knowledge for a more surgical aspect to manipulating vulnerable programs. This paper however, does not intend to be complete or comprehensive but rather as an addition to a persons E-shelf. Covert Systems Research will take kindly to any constructive criticism regarding this draft & any comments are welcome. http://www.covertsystems.org/archives/misc-papers/csr-exploitation.pdf Topics Covered: Stack overwrite Heap overwrite Function pointer overwrite (.bss) Format string Return-to-libc Enjoy, ~ SolarIce - -- ~ ---=[ Covert Systems Research ]=-----------------------------// ~ = www.covertsystems.org - ~ = Exploit Research & Development - ~ = Specializing in Linux & UNIX Systems - ~ --------------------------------------------=[ SolarIce ]=---// ~ --The more one reads & learns, the less the other person knows. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3rc2 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFAYABNKq9kGAk9yF8RAgYYAKCMNz6R+T+yeVEMMU3n4RrS4nR1oACgvUy0 ASsBv2RU51Mso/vskBa0weE= =mmbq -----END PGP SIGNATURE-----
Current thread:
- Analysis of the Exploitation Processes (.pdf) Steven Hill (Mar 23)