Exploiting Buffer Overflows On Kernels With Aslr Enabled Using Brute Force On The Stack Layer
Description:
A short video to illustrate how to exploit a buffer overflow vulnerable application on a Linux kernel >= 2.6.8 and
ASLR through a strategy of brute force on the stack layer. In fact, the base stack address for a certain process under a kernel that implements ASLR is chosen in a relatively small range (about 8 MB on a 32 bits machine). If we inject in the stack a quite large amount of
NOP bytes with a shellcode at the end, sooner or later (usually in about 30-40 attempts) the execution of the process will be hijacked right somewhere in the sequence of NOPs. They will be executed one by one, until the execution will reach our shellcode, that now will be successfully executed.
Tags: ASLR, buffer overflow, linux security, stack brute force
Tags: tools ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Comments: