What is ASLR? Address space layout randomization (ASLR) is an exploit mitigation technique that randomizes Stack address. Heap address. Shared library address. #echo 2 > /proc/sys/kernel/randomize_va_space libc base address would get randomized. NOTE
What is NX Bit? Its an exploit mitigation technique which makes certain areas of memory non executable and makes an executable area, non writable. Example: Data, stack and heap segments are made non executable while text segment is made non writable.
A simple way to chain multiple libc functions is to place one libc function address after another in the stack, but its not possible because of function arguments. chaining seteuid, system and exit would allows us to exploit the vulnerable code 'vuln
What is off-by-one bug? Copying source string into destination buffer could result in off-by-one when Source string length is equal to destination buffer length. When source string length is equal to destination buffer length, a single NULL byte gets
What is Integer Overflow? Storing a value greater than maximum supported value is called integer overflow. Integer overflow on its own doesnt lead to arbitrary code execution, but an integer overflow might lead to stack overflow or heap overflow whic