Главная
Study mode:
on
1
Intro
2
Attack Theory
3
Entry -vs- Effect
4
Injection Vector
5
Injector/Payload Pairs
6
Types of Injection
7
Who writes Injector Code?
8
How hard can it hit?
9
Buffer Overflow Injection
10
Challenges
11
Stack Injection
12
Address Housekeeping
13
Stack Overflow
14
Little and Big Endian
15
Where to put the payload
16
Confined Payload
17
Using more stack for payload
18
Large payload, Lowland address
19
A register points to the stack
20
Call thru a Register
21
Push a register then return
22
NOP Sled
23
Trespassing the HEAP
24
Overwrite the VTABLE
25
Overwrite VTABLE
26
Getting Bearings
27
XOR Protection
28
XOR again to decode
29
Hardcoded Function Calls
30
Pros/Cons to hard coding
31
Dynamic Function Loading
32
HASH Loading
33
Check CRC's
Description:
Dive into advanced buffer overflow techniques in this Black Hat USA 2000 conference talk by Greg Hoglund. Explore attack theory, injection vectors, and payload types while learning about the challenges of buffer overflow injection. Examine stack injection techniques, address housekeeping, and endianness considerations. Discover strategies for payload placement, including confined payloads and using more stack space. Investigate HEAP trespassing, VTABLE overwriting, and XOR protection. Compare hardcoded function calls with dynamic function loading, and understand the pros and cons of each approach. Gain insights into HASH loading and CRC checking in this comprehensive exploration of advanced buffer overflow methods.

Advanced Buffer Overflow Techniques

Black Hat
Add to list
0:00 / 0:00