0x07 Memory Corruption1
Veröffentlicht am 2019-06-20 10:00:00 +0000Download: Opus, OGG Vorbis oder MP3
Beschreibung
Diese Episode handelt von Memory-Corruption Schwachstellen. Die letzte Whatsapp-Schwachstelle zeigte wieder eindrucksvoll dass Memory-Corruption Schwachstellen lange nicht der Vergangenheit angehören. In dieser Folge möchten wir über stack-based Buffer Overflows sprechen.
Shownotes
- Segfault.fm Episode 0x06 Android Hardening
- CVE-2019-3568
- arstechnica: WhatsApp vulnerability exploited to infect phones with Israeli spyware
- osxdaily:Serious FaceTime Bug Allows Eavesdropping of Microphone on iPhone & Mac
- NSO Group
- CitizenLab
- Memory Corruption Attacks: The almost complete history
- WP: Morris Worm
- Aleph One: Smashing the stack for fun and profit
- WP: Virtual Memory
- WP: Cold Boot Attack
- WP: ELF Format
- WP: PE Format
- WP: DOS MZ Executable
- WP: Stack (Data Type)
- WP: Call Stack
- WP: X86 Register
- WP: Return Address
- WP: Memory Hierarchy
- Gute Visualisierung von Codebashing
- CERN: Common vulnerabilities guide for C programmers
- Protostar (Archive)
- Root Me
- Smash The Stack Wargammes Network
- WP: Shellcode
- Shellcode Datenbank
- Metasploit
- WP: NOP slide, NOP sled oder NOP ramp
- WP: Von Neumann Architecture
- WP: Executable space protection
- History: Non-Executable Stack
- WP: Return-to-libc attack
- WP: C Standard Library
- WP: Dynamic Linker
- Paper: Return-Oriented Programming without Returns (2010a)
- WP: Stack_canaries
- WP: Format String Attack
- WP: Address Space Layout Randomization
- WP: Position-independent_code (PIE)
- Go Programming Language
- Rust Lang
- WP: Control-flow Integrity
- Microsoft: SafeStr
- CERT Secure C Conding Standard
- WP: Fuzzing
- American Fuzzy Loop (AFL)