llsoftsecbook icon indicating copy to clipboard operation
llsoftsecbook copied to clipboard

Consider section on binary image exploits

Open sam-ellis opened this issue 3 years ago • 1 comments

Suggestion to add a section on binary images and how these are constructed and can be exploited, for example:

  • code versus data
  • read-only, relro, execute-only
  • ASLR
  • PLTs / GOTs
  • vtables
  • ...

sam-ellis avatar Jun 06 '22 08:06 sam-ellis

I've already mentioned ASLR briefly in the code reuse mitigations section, but I agree that the rest of the things on the list would also be relevant, possibly in the memory vulnerabilities chapter. Any suggestions on where they'd fit best are welcome!

g-kouv avatar Jun 30 '22 10:06 g-kouv