Chapter 8. Advanced Linux Exploits

It was good to get the basics under our belt, but working with the advanced subjects is likely how most gray hat ethical hackers will spend their time.

  • Format string exploits

    • The problem with format strings

    • Reading from arbitrary memory locations

    • Writing to arbitrary memory locations

    • Taking .dtors to root

  • Heap overflow exploits

  • Memory protection schemes

    • Compiler improvements/protections

    • Kernel level protections

    • Return into libc exploits

      • Used in non-executable stack/heap situations

      • Return into glibc functions directly

The field is advancing constantly, and there are always new techniques discovered by the hackers and new countermeasures implemented by developers. No matter which side you approach the problem from, you ...

Get Gray Hat Hacking, Second Edition, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.