Skip to main content

Questions tagged [aslr]

Address Space Layout Randomisation (ASLR) is a technology used to help prevent shellcode from being successful. It does this by randomly offsetting the location of modules and certain in-memory structures.

0 votes
2 answers
522 views

Reading a technical paper on the issue I wanted to test it on my computer. The idea is to provoke privilege escalation (change on the whoami output from peter to root) through a buffer overflow. The ...
nostromo's user avatar
  • 101
0 votes
0 answers
186 views

Let's assume we have this simple program: void main() { int x; printf("%p", &x); } Assuming the stack is mapped something like this: 0x007ffffffdd000 0x007ffffffff000 ...
milck's user avatar
  • 101
0 votes
0 answers
53 views

I have read about ASLR and understand that it randomizes the location in memory where an executable is loaded every time it is run. But I have a doubt, take an example of an elf executable. It tells ...
OSdev's user avatar
  • 1
4 votes
2 answers
4k views

The majority of my cyber security background comes in the form of web application vulnerability testing, and whilst I do have a degree of prior experience in studying and performing application ...
questioner's user avatar
1 vote
1 answer
981 views

I have this program that uses ASLR and it leaks information when i overflow a buffer, namely the address of printf. Furthermore i can overwrite the return address. How can i use this to spawn a shell? ...
Fluctuation10111's user avatar
0 votes
1 answer
720 views

I just printed function addresses and offset between two functions, but the offset is fixed whenever the program is executed (base address is only changed). Code (test.c) #include <stdio.h> #...
user257164's user avatar
2 votes
1 answer
473 views

Using standard hardening options like PIC, Stack Protection ... does a mere recompilation make a program more secure against attacks? You have the source code of a program, compile it two times with ...
plsrespond's user avatar
2 votes
1 answer
783 views

I'm trying to exploit a basic C program (below) which I've written: #include <stdio.h> #include <string.h> void main() { char ch[10]; scanf("%s", ch); if(strcmp(&...
Abhirup Bakshi's user avatar
1 vote
1 answer
478 views

With a single infoleak and access to the binary you can calculate the other addresses. Is this still possible when you don't have access to the binary?
aslr's user avatar
  • 11
1 vote
1 answer
446 views

I am working on exploiting an application on MIPS to further my knowledge of ROP chaining. The library I am trying to build a ROP chain is libuClibc-0.9.30.3.so. I found a gadget that I want to use ...
joshu's user avatar
  • 121
1 vote
2 answers
1k views

Let's say I have this piece of code that changes the 10 address to the value 20 and the following one to 30 mov ebx,10 mov [ebx],20 add ebx,1 mov ebx,30 How can the address change each time it is ...
for the's user avatar
  • 13
1 vote
3 answers
1k views

Is it safe to use non-ASLR DLL in an enabled ASLR EXE? Would the DLL be loaded to and will use random addressed, or should all the dependencies enable ASLR? In addition, what about other security ...
whiteberryapps's user avatar
3 votes
1 answer
1k views

I have following code: #include <stdio.h> #include <stdlib.h> int main() { int *ptr1 = malloc(16); int val1 = 0x12345678; printf("stack: %p\nheap: %p\n", &...
qwertyuiqwertyui's user avatar
10 votes
1 answer
1k views

From what I understand, ASLR has 3 Modes: 0 - turned off 1 - randomizes stack, heap, shared libraries, vDSO, mmap memory area and text area (if built with -fPIE -pie) 2 - additionally randomizes brk()-...
Mr_Mango's user avatar
  • 103
2 votes
1 answer
336 views

If a packer or crypter is used to obfuscate a piece of executable code, it seems that calls and references made in that code will not be updated at load-time and will be incorrect when the code is ...
chillsauce's user avatar

15 30 50 per page
1
2 3 4 5
7