This commit is contained in:
c0decave
2021-09-11 10:13:07 +02:00
parent e00ac3bf10
commit 21d69d2174

View File

@@ -14,6 +14,13 @@ corelan.be Exploitation Tutorials strongly rely on this application in a vulnera
# Anti-Exploitation
## ASLR
### Disable
* Add key to regedit
* regedit [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]
* MoveImages=dword:00000000
## DEP / ROP
### OS Specifics
@@ -67,5 +74,17 @@ corelan.be Exploitation Tutorials strongly rely on this application in a vulnera
* WriteProcessMemory(). This will allow you to copy your shellcode to another (executable) location, so you can jump to it and execute the shellcode. The target location must be writable and executable.
# References
## Exploitation
* https://www.corelan.be/index.php/2010/06/16/exploit-writing-tutorial-part-10-chaining-dep-with-rop-the-rubikstm-cube/
* https://www.corelan.be/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/
## Assembly
* https://www.felixcloutier.com/x86/pusha:pushad
## Tools
* https://hex-rays.com/ida-free/#download
* https://x64dbg.com/#start
* https://www.immunityinc.com/products/debugger/
* http://www.ollydbg.de/