Cyber Security Blog - page 4 | Puffin Security
Starting (from) the base: Attacks to base/frame pointer (EBP) READ MORE
Cyber security
Complementary Method : The Byte at the End of the Universe Stack
Cyber security
Starting (from) the base: Attacks to base/frame pointer (EBP)
Cyber security
ROP: In exploiting and love anything goes
Cyber security
ret2libc: Firing with its own gun
Cyber security
My name is overflow, buffer overflow

Today’s post is almost a continuation of a previous post. Because today we will bring the widespread ret2libc. Before starting, give a brief explanation of what is ASLR (Address Space Layout Randomization). It is a simple protection method that randomizes the...

Since 2000, operating systems began to support the NX bit and emulators of it. The PaX patch for Linux (who also includes ASLR), ExecShield (RedHat), W^X (OpenBSD and macOS) and DEP appear (from Windows to WinXP SP2). This protection is to distinguish memory pages ...

Start NOW mitigating risks