Binary Exploitation
Binary Exploitation
Praktika | 6 SWS / 10,0 ECTS (Kursbeschreibung) |
Veranstalter: | Julian Kirsch |
Beginn: |
Registration:https://kirschju.re/bx17w
Termine
- 03.07.2017 - 14:00 Uhr: Vorbesprechung in Raum 01.08.033
Inhalte
Vorkenntnisse
Grundlagenwissen über Betriebssysteme, C und Linux.
Literatur
IT-Sicherheit: Konzepte, Verfahren, Protokolle Claudia Eckert, 9. Auflage, De Gruyter, 2014. |
|
Hacking: The Art of Exploitation |
|
Exploiting Software: How to break code G. Hoglund und G. McGraw, Addison-Wesley, 2004. |
Links
- Aleph One. "Smashing The Stack For Fun And Profit." Phrack 49. 1996.
http://www.phrack.org/issues.html?id=14&issue=49 - klog. "The Frame Pointer Overwrite." Phrack 55. 1999.
http://www.phrack.org/issues.html?issue=55&id=8 - Nergal. "The advanced return-into-lib(c) exploits: PaX case study." Phrack 58. 2001.
http://www.phrack.org/issues.html?issue=58&id=4 - Bulba and Kil3r. "Bypassing Stackguard and Stackshield". Phrack 56. 2000.
http://www.phrack.org/issues.html?issue=56&id=5 - Michael Kaempf. "Vudo - An object superstitiously believed to embody magical powers."
Phrack 57. 2001.
http://www.phrack.org/issues.html?issue=57&id=8 - Anonymous. "Once upon a free()." Phrack 57. 2001.
http://www.phrack.org/issues.html?issue=57&id=9 - jp. "Advanced Doug lea's malloc exploits." Phrack 61. 2003.
http://www.phrack.org/issues.html?issue=61&id=6 - Phantasmal Phantasmagoria. "Malloc Maleficarum". Buqtraq. 2005.
http://www.packetstormsecurity.org/papers/attack/MallocMaleficarum.txt - blackngel. "MALLOC DES-MALEFICARUM." Phrack 66. 2009.
http://www.phrack.org/issues.html?issue=66&id=10