二进制学习系列-栈溢出之libc利用
https://cloud.tencent.com/developer/article/1515251
一步一步学 ROP 之 Linux_x86 篇
https://segmentfault.com/a/1190000005888964#articleHeader3
使用ret2libc攻击方法绕过数据执行保护
https://www.cnblogs.com/qwertwwwe/p/5749206.html
安全编码实践之五地址空间格局随机化ASLR
https://blog.csdn.net/zhongyunde/article/details/8607401
使用ret2libc攻击方法绕过数据执行保护
https://blog.csdn.net/linyt/article/details/43643499
浅谈pwn中的栈溢出攻击
https://mp.weixin.qq.com/s?__biz=MzI4NjYxNDk3Mg==&mid=2247484116&idx=1&sn=b0e838d56c7bc9915ed5df2a67d0adf1&chksm=ebdb7607dcacff116af07fbf17703dadae9a23a5402f65f0847d4b45ed5ed9771d5ca9197f5a&mpshare=1&scene=23&srcid=0324ljlg172g7ryqWTHdOKBR&sharer_sharetime=1585009689507&sharer_shareid=ff83fe2fe7db7fcd8a1fcbc183d841c4#rd
PWN入门路线
https://mp.weixin.qq.com/s?__biz=MzI4NjYxNDk3Mg==&mid=2247483894&idx=1&sn=1bc12157d3d0127d08a07be49a5e5fb9&chksm=ebdb7525dcacfc33904650a13db8821525b45d55e52badb5f1f81a46ea566d14a16409028929&mpshare=1&srcid=&sharer_sharetime=1566046896114&sharer_shareid=252bc2a0500f80be24dfe683440b4508&scene=21#wechat_redirect
ELF文件保护机制解读及绕过
https://mp.weixin.qq.com/s?__biz=MzU5OTQ3ODM0Mw==&mid=2247483654&idx=1&sn=2eae30ca2d40ad2b5e2aaff2beb3a9a4&chksm=feb5182ec9c29138c0cbb0baa56086730d3af16d2f689bebb1af26df947315092b55ff55aa48&mpshare=1&scene=23&srcid=0324MpdzMCso6jcbpuQKSa0m&sharer_sharetime=1585009740851&sharer_shareid=ff83fe2fe7db7fcd8a1fcbc183d841c4#rd
逆向等优秀文章推荐
最新推荐文章于 2024-09-07 08:53:59 发布