llsoftsecbook
llsoftsecbook copied to clipboard
Consider section on binary image exploits
Suggestion to add a section on binary images and how these are constructed and can be exploited, for example:
- code versus data
- read-only, relro, execute-only
- ASLR
- PLTs / GOTs
- vtables
- ...
I've already mentioned ASLR briefly in the code reuse mitigations section, but I agree that the rest of the things on the list would also be relevant, possibly in the memory vulnerabilities chapter. Any suggestions on where they'd fit best are welcome!