Chapter 4

System Exploitation

This chapter unveils the complete details of system exploitation covering different types of exploits and vulnerabilities used to compromise the system. The chapter provides a hierarchical layout of different protection mechanisms designed by vendors and how these are bypassed by attackers to author successful exploits. We cover in detail about Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) bypasses including exploit writing mechanisms such as Return-oriented Programming (ROP) and important information leakage vulnerabilities. The chapter also touches the different security solutions designed by associated companies to subvert exploit writing efforts of the attackers. In addition, details ...

Get Targeted Cyber Attacks now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.