Más contenido relacionado
Similar a Exploits & Mitigations - Memory Corruption Techniques (20)
Más de Cysinfo Cyber Security Community (20)
Exploits & Mitigations - Memory Corruption Techniques
- 2. Topics to cover
• Stack bof, DEP
• ROP attacks and Mitigations
• Heap Spray
• Abusing vptrs
• Use After Free
• Flash exploitations
• Heap Memory Management
• Mitigations
- 7. ROP Mitigations
• ASLR
• Stack limit check during API call (caller check)
• API call using retn instruction
• SimExecFlow
- 11. Use after Free
• Dangling pointer
• Addref() to keep count of direct references
• Vulnerability- Replace object with another
object
- 13. Heap Memory Management
• Front-End Allocators
– LookAside Lists
– Low Fragmentation Heap
• Back End Allocator
– FreeLists
- 15. References
• Mechanism behind IE CVE-2014-1776
• Heap Feng Shui in JavaScript
• UBIQUITOUS FLASH, UBIQUITOUS EXPLOITS
• kBouncer: Efficient and Transparent ROP
Mitigation
• Bypassing EMET 4.1