Cette page vous donne les différences entre la révision choisie et la version actuelle de la page.
les_pre-requis_failles_applicatives [2015/06/07 13:18] Geographer création |
les_pre-requis_failles_applicatives [2017/12/24 23:39] (Version actuelle) nono [Lecture conseillée] |
||
---|---|---|---|
Ligne 6: | Ligne 6: | ||
- Exploiter un Format String [[http://forum.zenk-security.com/thread-1613-post-18304.html|Lien1]] [[http://gits.hydraze.org/article-25-format-strings.html|Lien2]] [[http://repo.zenk-security.com/Techniques%20d.attaques%20%20.%20%20Failles/Les%20failles%20Format%20String.pdf|Lien3]] | - Exploiter un Format String [[http://forum.zenk-security.com/thread-1613-post-18304.html|Lien1]] [[http://gits.hydraze.org/article-25-format-strings.html|Lien2]] [[http://repo.zenk-security.com/Techniques%20d.attaques%20%20.%20%20Failles/Les%20failles%20Format%20String.pdf|Lien3]] | ||
- Exploiter un Heap Overflow via malloc() et un off-by-one [[http://www.phrack.org/issues.html?issue=66&id=10|Lien1]] [[http://www.phrack.org/issues.html?issue=57&id=8|Lien2]] [[http://www.phrack.org/issues.html?issue=57&id=9|Lien3]] [[http://archive.cert.uni-stuttgart.de/vuln-dev/2004/02/msg00025.html|Lien4]] [[http://www.phrack.org/issues.html?issue=66&id=6|Lien5]] [[http://www.cgsecurity.org/exploit/heaptut.txt|Lien6]] [[http://freeworld.thc.org/root/docs/exploit_writing/heap_off_by_one.txt|Lien7]] [[https://sploitfun.wordpress.com/2015/03/04/heap-overflow-using-malloc-maleficarum/|Lien8]] | - Exploiter un Heap Overflow via malloc() et un off-by-one [[http://www.phrack.org/issues.html?issue=66&id=10|Lien1]] [[http://www.phrack.org/issues.html?issue=57&id=8|Lien2]] [[http://www.phrack.org/issues.html?issue=57&id=9|Lien3]] [[http://archive.cert.uni-stuttgart.de/vuln-dev/2004/02/msg00025.html|Lien4]] [[http://www.phrack.org/issues.html?issue=66&id=6|Lien5]] [[http://www.cgsecurity.org/exploit/heaptut.txt|Lien6]] [[http://freeworld.thc.org/root/docs/exploit_writing/heap_off_by_one.txt|Lien7]] [[https://sploitfun.wordpress.com/2015/03/04/heap-overflow-using-malloc-maleficarum/|Lien8]] | ||
- | - Apprendre à exploiter un use-after-free [[http://www.garage4hackers.com/content/143-beginners-guide-use-after-free-exploits-ie-6-0-day-exploit-development.html|Lien1]] | + | - Apprendre à exploiter un use-after-free [[http://www.garage4hackers.com/entry.php?b=517|Lien1]] [[https://sploitfun.wordpress.com/2015/06/16/use-after-free/|Lien2]] |
- Apprendre à contourner un cannary [[http://gits.hydraze.org/article-24-buffer-overflows-sous-xp-sp2.html|Lien1]] | - Apprendre à contourner un cannary [[http://gits.hydraze.org/article-24-buffer-overflows-sous-xp-sp2.html|Lien1]] | ||
- | - Apprendre à contourner l'ASLR [[http://www.ece.cmu.edu/~dbrumley/courses/18739c-s11/docs/aslr.pdf|Lien1]] | + | - Apprendre à contourner l'ASLR [[https://web.archive.org/web/20140207151810/http://users.ece.cmu.edu/~dbrumley/courses/18739c-s11/docs/aslr.pdf|Lien1]] |
- Apprendre à exploiter un BOF via un ROP (Return Oriented Programming) [[http://cseweb.ucsd.edu/~hovav/dist/geometry.pdf|Lien1]] [[http://blog.zynamics.com/2010/03/12/a-gentle-introduction-to-return-oriented-programming/|Lien2]] [[http://trailofbits.files.wordpress.com/2010/04/practical-rop.pdf|Lien3]] [[https://crypto.stanford.edu/~blynn/rop/|Lien4]] | - Apprendre à exploiter un BOF via un ROP (Return Oriented Programming) [[http://cseweb.ucsd.edu/~hovav/dist/geometry.pdf|Lien1]] [[http://blog.zynamics.com/2010/03/12/a-gentle-introduction-to-return-oriented-programming/|Lien2]] [[http://trailofbits.files.wordpress.com/2010/04/practical-rop.pdf|Lien3]] [[https://crypto.stanford.edu/~blynn/rop/|Lien4]] | ||
- Coder son premier shell code local | - Coder son premier shell code local | ||
Ligne 16: | Ligne 16: | ||
======Lecture conseillée====== | ======Lecture conseillée====== | ||
- | - [[http://forum.zenk-security.com/thread-2175.html|Mémoire de X_Cli]] (Très bien écrit et à la porté des débutants) | + | - [[https://repo.zenk-security.com/Techniques%20d.attaques%20%20.%20%20Failles/Etude%20de%20techniques%20d%20exploitation%20de%20vulnerabilites%20des%20executables%20sous%20GNU.Linux%20IA-32%20et%20de%20methodes%20de%20protection%20associees.pdf|Mémoire de X_Cli]] (Très bien écrit et à la porté des débutants) |
- [[http://www.mgraziano.info/docs/stsi2010.pdf|Smashing the stack in 2010]] (En anglais mais assez complet) | - [[http://www.mgraziano.info/docs/stsi2010.pdf|Smashing the stack in 2010]] (En anglais mais assez complet) | ||
- [[http://www.amazon.fr/Techniques-hacking-1C%C3%A9d%C3%A9rom-Jon-Erickson/dp/2744022640|Techniques de hacking]] [Livre] | - [[http://www.amazon.fr/Techniques-hacking-1C%C3%A9d%C3%A9rom-Jon-Erickson/dp/2744022640|Techniques de hacking]] [Livre] |