ARM Exploitation: Return Oriented Programming (0x64 ∧ 0x6d) ∨ 0x69 Logo

ARM Exploitation: Return Oriented Programming (0x64 ∧ 0x6d) ∨ 0x69

0
Free
Visit Website

Building ROP chains to defeat data execution prevention - DEP. This series is about exploiting simple stack overflow vulnerabilities using return oriented programming (ROP) to defeat data execution prevention - DEP. There are three posts in this series. The posts got pretty dense, there is a lot of stuff to understand. If you miss anything, find bugs (language / grammar / ...), have ideas for improvements or any questions, do not hesitate to contact (via Twitter or contact page) me. I am happy to answer your questions and incorporate improvements in this post. Latest Update of this series: 03.12.2018 Changelog 03.12.2018: Added a working, prebuild environment to ease the process of getting started. 13.10.2018: Updated "Setup & Tool with hints how to initialize the Archlinux ARM keyring and commands to install the necessary packages. Also added command line switch to disable GCC stack canaries. 07.09.2018: Added note to successfully set up the bridge interface with qemu (in the first part). 1 - ARM Exploitation - Setup and Tools In the first part I describe the setup I used, which includes a set of script to build a QEMU based ArchLinux ARM environment and a vulnerable HTTP daemon.

FEATURES

ALTERNATIVES

A free, open-source network protocol analyzer for capturing and displaying packet-level data.

Object scanning system with scalable and flexible architecture for intrusion detection.

A simple IOC scanner bash script for Linux/Unix/OSX systems

A low interaction Python honeypot designed to mimic various services and ports to attract attackers and log access attempts.

A tool to search for Sentry config on a page or in JavaScript files and check for blind SSRF

A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.

A network protocol panic button operating decentralized through UDP broadcasts and HTTP, intended for sensitive networks to prevent cold boot attacks.

Tcpreplay is a suite of Open Source utilities for editing and replaying captured network traffic.

PINNED