11.07.2015 Views

EC-Council Certified Secure Programmer

EC-Council Certified Secure Programmer

EC-Council Certified Secure Programmer

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

• Introduction• Targeting Vulnerabilities• Remote and Local Exploits• A Two-Stage Exploit• Format String Attackso Example of a Vulnerable Program• Using %n Character• Fixing Format String Bugs• User-Supplied Format String Vulnerability CVE-2000-0763 in xlockmore• TCP/IP Vulnerabilities• Race Conditions• File Race Conditions• Signal Race Conditions• Input Validation Error in man Program• Input Validation Error in man Program (Snippet 1)• Input Validation Error in man Program (Snippet 2)• Writing Exploits and Vulnerability Checking Programso Writing Exploits and Vulnerability Checking Programs Sample Code• Stack Overflow Exploits• Memory Organization• Stack Overflows• Finding Exploitable Stack Overflows in Open-Source Software• Finding Exploitable Stack Overflows in Closed-Source Software• Heap Corruption Exploits• Doug Lea Malloc• Dlmalloc Chunk• Freed Dlmalloc Chunk• Vulnerable Program ExamplePage 45http://www.eccouncil.org<strong>EC</strong>-<strong>Council</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!