Jump to content
Nytro

EXPLOITING BUFFER OVERFLOWS ON MIPS ARCHITECTURES

Recommended Posts

Posted

EXPLOITING BUFFER OVERFLOWS ON MIPS ARCHITECTURES

 

A Walkthrough by Lyon Yang @l0Op3r

Editing and Support: Bernhard Mueller

 

Table of Contents

1. Introduction............................................................................................................. 3

2. Triggering and Debugging the Exploit....................................................................... 3

3. Cache Incoherency ................................................................................................... 7

4. Overcoming ASLR..................................................................................................... 8

5. Using ROP Gadgets .................................................................................................. 9

6. Writing the exploit – Calculating Offsets ................................................................ 14

7. Writing the exploit – Writing the MIPS Shellcode Encoder ..................................... 17

8. Writing the exploit – fork() Shellcode..................................................................... 22

 

Download: https://www.exploit-db.com/docs/39658.pdf

  • Upvote 5

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...