March 2022
Intermediate to advanced
752 pages
18h 47m
English
In this chapter, we cover the following topics:
• Bypassing non-executable stack (NX) with return-oriented programming (ROP)
• Defeating stack canaries
• Address space layout randomization (ASLR) bypass with an information leak
• Position Independent Executable (PIE) bypass with an information leak
Now that you have the basics under your belt from reading Chapter 10, you are ready to study more advanced Linux exploits. The field is advancing constantly, with new techniques always being discovered by hackers and countermeasures being implemented by developers. No matter how you approach the problem, you need to move beyond the basics. That said, we can only go so far in this book—your journey is ...