Категории: Все - exploitation - security - memory - code

по CAITLYN KNIGHTS 2 лет назад

92

Binary language

In computing, various techniques and vulnerabilities can be exploited to manipulate or gain unauthorized access to systems. One such method involves the use of "NOP sleds," which help attackers navigate memory by using a series of '

Binary language

Binary language

NOP sled

Hard to find exact location of memory of the pointer
Means no operation

Bug exploration

Taking advantage of a bug or vulnerability to find problems
Memory corruption

Shell code

Small piece of code used as payload in exploitation of a software

Buffer overloads

Enables attacker to input malicious codes
Receives more data then can hold -> overload
Buffer is a specific area of memory
Violation of memory security

Registers

Store resulting data
Preform operations
Holds temporary data that the CPU needs to execute