Designed by thousands of monkeys with hundreds of typewriters
Buffer Overflows and You
for 64-bit Linux systems!

References

[1] W. Holzmann, "Memory Layout (Virtual address space of a C process," www.cs.uleth.ca. [Online]. Available: http://www.cs.uleth.ca/~holzmann/C/system/memorylayout.pdf. [Accessed: Apr. 5, 2010].

[2] Wikipedia, the free encyclopedia, "x86 calling conventions," Wikimedia Foundation. [Online]. Available: http://en.wikipedia.org/wiki/X86_calling_conventions. [Accessed: Apr. 30, 2010].

[3] G. Bugher, "OS-Based Mitigations Against Common Attacks," Perimiter Grid. [Online]. Available: http://perimetergrid.com/wp/2008/02/04/os-based-mitigations-against-common-attacks/. [Accessed: Apr. 30, 2010].

[4] A. One, "Smashing the Stack for Fun and Profit," Phrack, vo. 7, no. 49, Aug. 11, 1996. [Online]. Available: Phrack, http://www.phrack.com/issues.html?issue=49&id=14. [Accessed Mar. 29, 2010].

[5] Wikipedia, the free encyclopedia, "setuid," Wikimedia Foundation. [Online] Available: http://en.wikipedia.org/wiki/Setuid. [Accessed: Apr. 30, 2010].

[6] Wikipedia, the free encyclopedia, "Buffer overflow," Wikimedia Foundation. [Online]. Available: http://en.wikipedia.org/wiki/Buffer_overflow#NOP_sled_technique. [Accessed: Apr. 30, 2010].

[7] c0ntex, "Bypassing non-executable-stack during exploitation using return-to-libc," infosecwriters.com. [Online]. Available: http://www.infosecwriters.com/text_resources/pdf/return-tolibc.pdf. [Accessed: Mar. 29, 2010].

Next Page