开发者

Books and shellcode examples [closed]

As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance. Closed 11 years ago.

i read "art of exploitation" and "gray hat hackers".Both these books examples written for x8开发者_运维技巧6 systems.i have a centrino laptop and an amd64 pc.I can't make work examples for stack based overflow.


On 64-bit systems using ASLR, executable space protection makes it far more difficult to execute such attacks. This may explain why you're failing to make them work.

I suggest reading this paper on x86-64 buffer overflow exploits for further information.


I'd suggest the example in Aleph One' article "Smashing the Stack for Fun and Profit". You can find it here: link text


You can use some virtualization software (like Virtualbox) to run x86 system of your choice to play around also in amd64 system.


There are a lot of protections built into OS and compilers to stop those exploits. Or at least make them a heck of a lot more difficult: Noexec stacks, stack canaries, and so on.

Windows also uses stack monitoring as well. Linux has similar features. You really should consider taking your questions like these to a forum other than this one.

0

上一篇:

下一篇:

精彩评论

暂无评论...
验证码 换一张
取 消

最新问答

问答排行榜