SlideShare a Scribd company logo
Seguretat Local exploits v2011/01 Carles Mateu i Ramon Bèjar Departament d'Informàtica i Enginyeria Industrial Universitat de Lleida
Exploits Programs and tools that, take profit from a vulnerability (usually a programming error) to gain access, scalate privileges, etc.
Programming 101 Computer memory (executing programs)
C Calling Convention
Buffer management
Computer memory Basics
Segments
Stacks
Computer memory basics Endianness: Byte order when storing multibyte data in memory.
Little endian: L1 L2 H1 H2 Big endian: H1 H2 L1 L2 Intel: little endian. Motorola: big endian. Network: big endian.
Computer memory: Segments .text : Executable code. RO and Fixed Size.
.data : Global  initialized  variables. Fixed Size.
.bss : (below stack section). Global  NON -initialized variables. Fixed Size.
Heap: Dynamic allocated space. Grows from low -> high.  (malloc, free).
Stack: Dynamic. Grows from high -> low. Keeps calling stack and local variables.
Env: System environment variables and program arguments.
Computer memory: Segment layout.
Segment layout example. int index = 5; // data (initialized) char * str; // bss (uninitialized) int nothing; // bss (uninitialized) void fun(int c) // stack { int i=c; // stack region str = (char*)malloc(10*sizeof (char)); // heap strncpy(str, "abcde", 5);  } void main () { fun(1); }

More Related Content

PDF
Introduction to Python Programming | InsideAIML
PPTX
Python Programming | JNTUK | UNIT 1 | Lecture 3
PPTX
Embedded c programming
PPT
isa architecture
PDF
Embedded C - Lecture 4
PPTX
Managing console input
PPT
Instruction Set Architecture
PDF
Organization of the ibm personal computers
Introduction to Python Programming | InsideAIML
Python Programming | JNTUK | UNIT 1 | Lecture 3
Embedded c programming
isa architecture
Embedded C - Lecture 4
Managing console input
Instruction Set Architecture
Organization of the ibm personal computers

What's hot (20)

PPTX
Python Programming | JNTUK | UNIT 1 | Lecture 1 & 2
PDF
Intel Hex Format
PPT
Mips architecture
PPT
Embedded c program and programming structure for beginners
PPTX
Loops in Python
PDF
Assembly Langauge Chap 1
PPTX
Intermediate code representations
PPT
isa architecture
PPTX
Manipulators
PPTX
Iostream in c++
PDF
2014 MIPS Progrmming for NTUIM
PPTX
Managing console
PPTX
Introduction to Assembly Language Programming
PDF
Machine language
PPTX
Chapter 02 instructions language of the computer
PPTX
Buffer Overflow Demo by Saurabh Sharma
PPTX
05 instruction set design and architecture
PPTX
Intro to assembly language
Python Programming | JNTUK | UNIT 1 | Lecture 1 & 2
Intel Hex Format
Mips architecture
Embedded c program and programming structure for beginners
Loops in Python
Assembly Langauge Chap 1
Intermediate code representations
isa architecture
Manipulators
Iostream in c++
2014 MIPS Progrmming for NTUIM
Managing console
Introduction to Assembly Language Programming
Machine language
Chapter 02 instructions language of the computer
Buffer Overflow Demo by Saurabh Sharma
05 instruction set design and architecture
Intro to assembly language
Ad

Similar to Local Exploits (20)

PDF
The Best Programming Practice for Cell/B.E.
PDF
Smash the Stack: Writing a Buffer Overflow Exploit (Win32)
PDF
Dive into exploit development
DOCX
Chapter 1SyllabusCatalog Description Computer structu
PPT
Data race
PPT
1 Intro To Micro P
PPTX
Linux System Programming - Advanced File I/O
PDF
nasm_final
PPTX
5.6 Basic computer structure microprocessors
PPT
Malware Analysis - x86 Disassembly
PDF
Buffer overflow tutorial
PDF
Please send the answers to my email. Mirre06@hotmail.comSomeone se.pdf
PDF
Unmanaged Parallelization via P/Invoke
PPTX
Reversing & Malware Analysis Training Part 4 - Assembly Programming Basics
PPTX
C++ Memory Management
PPT
Chapter Seven(1)
KEY
Post Exploitation Bliss: Loading Meterpreter on a Factory iPhone, Black Hat U...
PPTX
weekly assessment with a perfect examples
The Best Programming Practice for Cell/B.E.
Smash the Stack: Writing a Buffer Overflow Exploit (Win32)
Dive into exploit development
Chapter 1SyllabusCatalog Description Computer structu
Data race
1 Intro To Micro P
Linux System Programming - Advanced File I/O
nasm_final
5.6 Basic computer structure microprocessors
Malware Analysis - x86 Disassembly
Buffer overflow tutorial
Please send the answers to my email. Mirre06@hotmail.comSomeone se.pdf
Unmanaged Parallelization via P/Invoke
Reversing & Malware Analysis Training Part 4 - Assembly Programming Basics
C++ Memory Management
Chapter Seven(1)
Post Exploitation Bliss: Loading Meterpreter on a Factory iPhone, Black Hat U...
weekly assessment with a perfect examples
Ad

More from Carles Mateu (19)

PDF
Gamificacio - Noves Tecnologies Turisme
PDF
Seguretat de Xarxa
PDF
Seguretat de Sistemes
PDF
Virtualització
ODP
Dai 09-ruby on rails
PDF
Dai 9 - Ruby on Rails
ODP
Curs Estiu: Continguts
PDF
Curs Estiu: Laboratori 1
PDF
Curs Estiu: Laboratori 2
PDF
Curs Estiu: Laboratori 3
PDF
Curs Estiu: Laboratori 0
PDF
Microblogs
PDF
Xarxes Socials
PDF
Introducció als Blogs
PDF
Felicitacio
PDF
Com fer presentacions
PDF
Màster Enginyeria Programari Lliure
ODP
Visions Professionals Programari Lliure
PDF
Universitat Estiu: Introducció Programari Lliure
Gamificacio - Noves Tecnologies Turisme
Seguretat de Xarxa
Seguretat de Sistemes
Virtualització
Dai 09-ruby on rails
Dai 9 - Ruby on Rails
Curs Estiu: Continguts
Curs Estiu: Laboratori 1
Curs Estiu: Laboratori 2
Curs Estiu: Laboratori 3
Curs Estiu: Laboratori 0
Microblogs
Xarxes Socials
Introducció als Blogs
Felicitacio
Com fer presentacions
Màster Enginyeria Programari Lliure
Visions Professionals Programari Lliure
Universitat Estiu: Introducció Programari Lliure

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Big Data Technologies - Introduction.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Spectroscopy.pptx food analysis technology
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Electronic commerce courselecture one. Pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
The AUB Centre for AI in Media Proposal.docx
Advanced methodologies resolving dimensionality complications for autism neur...
Building Integrated photovoltaic BIPV_UPV.pdf
sap open course for s4hana steps from ECC to s4
Big Data Technologies - Introduction.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Assigned Numbers - 2025 - Bluetooth® Document
A comparative analysis of optical character recognition models for extracting...
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectroscopy.pptx food analysis technology
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
MIND Revenue Release Quarter 2 2025 Press Release
“AI and Expert System Decision Support & Business Intelligence Systems”
Programs and apps: productivity, graphics, security and other tools
Mobile App Security Testing_ A Comprehensive Guide.pdf
Unlocking AI with Model Context Protocol (MCP)
Electronic commerce courselecture one. Pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

Local Exploits