Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
7 Cards in this Set
- Front
- Back
Buffer overflows
|
Most common security vulnerability
Important ingredients: program that suid to root put root-grabbing code in address space jump to that code |
|
3 regions of process memory (low to high memory address)
|
text: includes program instructions, read only
data: static variables and heap memory stack: ADT for function calls |
|
stack
|
stack pointer points to top
bottom is fixed address parameters pushed in reverse order move toward low memory address |
|
stack picture (low to high memory address)
|
local variables
sfp ret parameters |
|
to find overflows
|
read source code
run service, attempt systematic crash, search core dump for given log tag automated tools |
|
preventing overflows
|
don't use strcpy, strcat, sprintf
type safe languages non-executable stack random stack location run-time checks (random or terminator canaries) |
|
other types of attack
|
integer overflow
letting user specify format string return to libc overflow (let system call do work when buffer to small...) |