Skip to Content
Hacking: The Art of Exploitation, 2nd Edition
book

Hacking: The Art of Exploitation, 2nd Edition

by Jon Erickson
January 2008
Beginner to intermediate
480 pages
12h 58m
English
No Starch Press
Content preview from Hacking: The Art of Exploitation, 2nd Edition

Nonexecutable Stack

Most applications never need to execute anything on the stack, so an obvious defense against buffer overflow exploits is to make the stack nonexecutable. When this is done, shellcode inserted anywhere on the stack is basically useless. This type of defense will stop the majority of exploits out there, and it is becoming more popular. The latest version of OpenBSD has a nonexecutable stack by default, and a nonexecutable stack is available in Linux through PaX, a kernel patch.

ret2libc

Of course, there exists a technique used to bypass this protective countermeasure. This technique is known as returning into libc. libc is a standard C library that contains various basic functions, such as printf() and exit(). These functions are ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Hands on Hacking

Hands on Hacking

Matthew Hickey, Jennifer Arcuri
The Complete Ethical Hacking Course

The Complete Ethical Hacking Course

Codestars By Rob Percival, Atil Samancioglu

Publisher Resources

ISBN: 9781593271442Supplemental ContentErrata Page