본문 바로가기

Security

[System Hacking] 8. Several System Tricks 보호되어 있는 글입니다. 더보기
[Reversing] Cross-Compiler & Remote Debugging with gdb on Linux Cross-Compiler & Remote Debugging with gdb on Linux1. Installing Cross-Compiler for MIPS, ARM, PPC, etc... 12345678910sudo apt-get install -y gcc-multilib-arm-linux-gnueabisudo apt-get install -y gcc-multilib-arm-linux-gnueabihfsudo apt-get install -y gcc-multilib-mips-linux-gnusudo apt-get install -y gcc-multilib-mips64-linux-gnuabi64sudo apt-get install -y gcc-multilib-mips64el-linux-gnuabi64s.. 더보기
[System Hacking] 7. Several Leaking & Stack Smashing Techniques 보호되어 있는 글입니다. 더보기
[System Hacking] 6. SigReturn Oriented Programming SigReturn Oriented ProgrammingThis time I gonna post about SROP on x86, x86-64 linux(ubuntu). When i solved pwnable.kr 'unexploitable' challenge, there are over 2-way solutions. one is SROP(original intend) and another is ROP. So, i just decided to post 'SROP' tech. Surely there are differences, ROP and SROP. In short, when doing SROP, all we need is 'int 0x80;ret' and control of eax gadgets lik.. 더보기
[System Hacking] 5. Return Oriented Programming Return Oriented ProgrammingThis time i gonna introduce about ROP attack(Return Oriented Programming). Before doing ROP, there are prior knowledges. 'RTL Chaining', 'GOT Overwrite/Dereference', 'Gadget', etc... - RTL Chaining'RTL Chaining' means continuously executed RTL. By using pop-..-ret gadget, function's arguments will be popped by 'pop' and next function will be executed by 'ret'. and goin.. 더보기