Continued with library injection attack

This commit is contained in:
h3xduck
2022-06-09 22:57:25 -04:00
parent a46339e912
commit 1595caa8d0
22 changed files with 957 additions and 311 deletions

View File

@@ -543,6 +543,56 @@ AMD64 Architecture Processor Supplement},
@online{glibc,
title={The GNU C library},
url={https://www.gnu.org/software/libc/}
},
@online{plt_got_technovelty,
title={PLT and GOT - the key to code sharing and dynamic libraries},
author={Ian Wienand},
url={https://www.technovelty.org/linux/plt-and-got-the-key-to-code-sharing-and-dynamic-libraries.html},
date={2011-05-11}
},
@online{plt_got_overlord,
title={GOT and PLT for pwning.},
author={David Tomaschik},
url={https://systemoverlord.com/2017/03/19/got-and-plt-for-pwning.html},
date={2017-03-19}
},
@manual{elf,
title={ELF},
url={https://wiki.osdev.org/ELF}
},
@online{pie_exploit,
title={Position Independent Code},
url={https://ir0nstone.gitbook.io/notes/types/stack/pie}
},
@online{aslr_pie_intro,
title={aslr/pie intro},
url={https://guyinatuxedo.github.io/5.1-mitigation_aslr_pie/index.html#aslrpie-intro}
},
@online{relro_readhat,
title={Hardening ELF binaries using Relocation Read-Only (RELRO)},
author={Huzaifa Sidhpurwala},
date={2019-01-28},
url={https://www.redhat.com/en/blog/hardening-elf-binaries-using-relocation-read-only-relro}
},
@online{cet_windows,
title={R.I.P ROP: CET Internals in Windows 20H1},
author={Yarden Shafir, Alex Ionescu},
date={2020-05-01},
url={https://windows-internals.com/cet-on-windows/}
},
@online{cet_linux,
title={Another Round Of Intel CET Patches, Still Working Toward Linux Kernel Integration},
author={Michael Larabel},
date={2021-07-21},
url={https://www.phoronix.com/scan.php?page=news_item&px=Intel-CET-v29}
}