Jump to content
Nytro

EXPLOITING BUFFER OVERFLOWS ON MIPS ARCHITECTURES

Recommended Posts

EXPLOITING BUFFER OVERFLOWS ON MIPS ARCHITECTURES

 

A Walkthrough by Lyon Yang @l0Op3r

Editing and Support: Bernhard Mueller

 

Table of Contents

1. Introduction............................................................................................................. 3

2. Triggering and Debugging the Exploit....................................................................... 3

3. Cache Incoherency ................................................................................................... 7

4. Overcoming ASLR..................................................................................................... 8

5. Using ROP Gadgets .................................................................................................. 9

6. Writing the exploit – Calculating Offsets ................................................................ 14

7. Writing the exploit – Writing the MIPS Shellcode Encoder ..................................... 17

8. Writing the exploit – fork() Shellcode..................................................................... 22

 

Download: https://www.exploit-db.com/docs/39658.pdf

  • Upvote 5
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...