1. Overflow an input field, command-line argument, or input buffer — for example, on a network daemon — until it writes into the stack.
2. Overwrite the current return address on the stack with the address of the exploit code loaded in step 3.
3. Write a simple set The result of this attack program’s execution will be a root shell or other privileged command execution.
For instance, if a web-page form expects a user name to be entered into a field, the attacker could send the user name, plus extra characters to overflow the buffer and reach the stack, plus a new return address to load onto the stack, plus the code the attacker wants to run. When the buffer-reading subroutine returns from execution, the return address is the exploit code, and the code is run.
of code for the next space in the stack that includes the commands that the attacker wishes to execute — for instance, spawn a shell.
đang được dịch, vui lòng đợi..
