System Exploitation
This chapter unveils the complete details of system exploitation covering different types of exploits and vulnerabilities used to compromise the system. The chapter provides a hierarchical layout of different protection mechanisms designed by vendors and how these are bypassed by attackers to author successful exploits. We cover in detail about Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) bypasses including exploit writing mechanisms such as Return-oriented Programming (ROP) and important information leakage vulnerabilities. The chapter also touches the different security solutions designed by associated companies to subvert exploit writing efforts of the attackers. In addition, details ...
Get Targeted Cyber Attacks now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.