Главная
Study mode:
on
1
Introduction
2
Agenda
3
License Fees
4
Architecture
5
Important registers
6
Local variables
7
Hacking
8
Buffer Overflow
9
Approach
10
Shell Code
11
Buffer Size
12
Snail bites
13
Using odd numbers
14
Using larger numbers
15
Writable stack
16
Shellcode
17
Overwrite Buffer
18
Program nominee
19
Object dump
20
Fill the buffer
21
Fix the stack
22
Questions
23
Userspace
24
Outro
Description:
Explore the intricacies of buffer overflow exploitation on the RISC-V architecture in this 36-minute conference talk. Gain an introduction to RISC-V and understand how exploitation techniques differ from Intel and ARM platforms. Learn to overflow buffers, create shellcode in assembly language, and perform ret2libc attacks. Delve into important registers, local variables, and hacking approaches specific to RISC-V. Discover techniques for manipulating buffer sizes, utilizing odd numbers, and leveraging writable stacks. Examine practical examples of overwriting buffers, fixing stacks, and analyzing object dumps. Suitable for those with a basic understanding of assembly and C programming.

Exploiting Buffer Overflows on RISC-V

Linux Foundation
Add to list
0:00 / 0:00