mirror of
https://github.com/h3xduck/TripleCross.git
synced 2025-12-16 23:33:06 +08:00
Finished rop explanation
This commit is contained in:
@@ -535,6 +535,10 @@ AMD64 Architecture Processor Supplement},
|
||||
pages={37}
|
||||
},
|
||||
|
||||
@online{rop_prog_finder,
|
||||
title={ROPgadget Tool},
|
||||
url={https://github.com/JonathanSalwan/ROPgadget}
|
||||
}
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -421,15 +421,23 @@
|
||||
\newlabel{fig:buffer_overflow}{{4.2}{58}{Stack buffer overflow overwriting ret value.\relax }{figure.caption.50}{}}
|
||||
\@writefile{lof}{\defcounter {refsection}{0}\relax }\@writefile{lof}{\contentsline {figure}{\numberline {4.3}{\ignorespaces Executing arbitrary code exploiting a buffer overflow vulnerability.\relax }}{59}{figure.caption.51}\protected@file@percent }
|
||||
\newlabel{fig:buffer_overflow_shellcode}{{4.3}{59}{Executing arbitrary code exploiting a buffer overflow vulnerability.\relax }{figure.caption.51}{}}
|
||||
\@writefile{toc}{\defcounter {refsection}{0}\relax }\@writefile{toc}{\contentsline {chapter}{\numberline {5}Results}{60}{chapter.5}\protected@file@percent }
|
||||
\abx@aux@cite{rop_prog_finder}
|
||||
\abx@aux@segm{0}{0}{rop_prog_finder}
|
||||
\@writefile{toc}{\defcounter {refsection}{0}\relax }\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.2}Return oriented programming with eBPF}{60}{subsection.4.1.2}\protected@file@percent }
|
||||
\newlabel{code:rop_ex}{{4.2}{60}{Sample program to run using ROP}{lstlisting.4.2}{}}
|
||||
\@writefile{lol}{\defcounter {refsection}{0}\relax }\@writefile{lol}{\contentsline {lstlisting}{\numberline {4.2}Sample program to run using ROP.}{60}{lstlisting.4.2}\protected@file@percent }
|
||||
\@writefile{lof}{\defcounter {refsection}{0}\relax }\@writefile{lof}{\contentsline {figure}{\numberline {4.4}{\ignorespaces Steps for executing code sample using ROP.\relax }}{61}{figure.caption.52}\protected@file@percent }
|
||||
\newlabel{fig:rop_compund}{{4.4}{61}{Steps for executing code sample using ROP.\relax }{figure.caption.52}{}}
|
||||
\@writefile{toc}{\defcounter {refsection}{0}\relax }\@writefile{toc}{\contentsline {chapter}{\numberline {5}Results}{63}{chapter.5}\protected@file@percent }
|
||||
\@writefile{lof}{\defcounter {refsection}{0}\relax }\@writefile{lof}{\addvspace {10\p@ }}
|
||||
\@writefile{lot}{\defcounter {refsection}{0}\relax }\@writefile{lot}{\addvspace {10\p@ }}
|
||||
\@writefile{toc}{\defcounter {refsection}{0}\relax }\@writefile{toc}{\contentsline {chapter}{\numberline {6}Conclusion and future work}{61}{chapter.6}\protected@file@percent }
|
||||
\@writefile{toc}{\defcounter {refsection}{0}\relax }\@writefile{toc}{\contentsline {chapter}{\numberline {6}Conclusion and future work}{64}{chapter.6}\protected@file@percent }
|
||||
\@writefile{lof}{\defcounter {refsection}{0}\relax }\@writefile{lof}{\addvspace {10\p@ }}
|
||||
\@writefile{lot}{\defcounter {refsection}{0}\relax }\@writefile{lot}{\addvspace {10\p@ }}
|
||||
\@writefile{toc}{\defcounter {refsection}{0}\relax }\@writefile{toc}{\contentsline {chapter}{Bibliography}{62}{chapter.6}\protected@file@percent }
|
||||
\newlabel{annex:bpftool_flags_kernel}{{6}{}{Appendix A - Bpftool commands}{chapter*.53}{}}
|
||||
\@writefile{toc}{\defcounter {refsection}{0}\relax }\@writefile{toc}{\contentsline {chapter}{Bibliography}{65}{chapter.6}\protected@file@percent }
|
||||
\newlabel{annex:bpftool_flags_kernel}{{6}{}{Appendix A - Bpftool commands}{chapter*.54}{}}
|
||||
\abx@aux@read@bbl@mdfivesum{77A5019A60516627679C213125A49687}
|
||||
\abx@aux@read@bblrerun
|
||||
\abx@aux@refcontextdefaultsdone
|
||||
\abx@aux@defaultrefcontext{0}{ransomware_pwc}{none/global//global/global}
|
||||
\abx@aux@defaultrefcontext{0}{rootkit_ptsecurity}{none/global//global/global}
|
||||
@@ -509,4 +517,4 @@
|
||||
\abx@aux@defaultrefcontext{0}{tcp_reliable}{none/global//global/global}
|
||||
\abx@aux@defaultrefcontext{0}{tcp_handshake}{none/global//global/global}
|
||||
\ttl@finishall
|
||||
\gdef \@abspage@last{86}
|
||||
\gdef \@abspage@last{90}
|
||||
|
||||
@@ -2447,6 +2447,7 @@
|
||||
<bcf:citekey order="110">tcp_reliable</bcf:citekey>
|
||||
<bcf:citekey order="111">tcp_handshake</bcf:citekey>
|
||||
<bcf:citekey order="112">evil_ebpf_p6974</bcf:citekey>
|
||||
<bcf:citekey order="113">rop_prog_finder</bcf:citekey>
|
||||
</bcf:section>
|
||||
<!-- SORTING TEMPLATES -->
|
||||
<bcf:sortingtemplate name="none">
|
||||
|
||||
@@ -1,96 +1,96 @@
|
||||
[0] Config.pm:311> INFO - This is Biber 2.16
|
||||
[0] Config.pm:314> INFO - Logfile is 'document.blg'
|
||||
[57] biber:340> INFO - === Mon Jun 6, 2022, 21:52:43
|
||||
[70] Biber.pm:415> INFO - Reading 'document.bcf'
|
||||
[145] Biber.pm:952> INFO - Found 77 citekeys in bib section 0
|
||||
[159] Biber.pm:4340> INFO - Processing section 0
|
||||
[168] Biber.pm:4531> INFO - Looking for bibtex format file 'bibliography/bibliography.bib' for section 0
|
||||
[171] bibtex.pm:1689> INFO - LaTeX decoding ...
|
||||
[200] bibtex.pm:1494> INFO - Found BibTeX data source 'bibliography/bibliography.bib'
|
||||
[376] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 9, warning: 1 characters of junk seen at toplevel
|
||||
[376] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 15, warning: 1 characters of junk seen at toplevel
|
||||
[376] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 22, warning: 1 characters of junk seen at toplevel
|
||||
[376] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 28, warning: 1 characters of junk seen at toplevel
|
||||
[377] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 35, warning: 1 characters of junk seen at toplevel
|
||||
[377] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 42, warning: 1 characters of junk seen at toplevel
|
||||
[377] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 50, warning: 1 characters of junk seen at toplevel
|
||||
[377] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 58, warning: 1 characters of junk seen at toplevel
|
||||
[377] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 65, warning: 1 characters of junk seen at toplevel
|
||||
[377] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 70, warning: 1 characters of junk seen at toplevel
|
||||
[377] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 77, warning: 1 characters of junk seen at toplevel
|
||||
[377] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 85, warning: 1 characters of junk seen at toplevel
|
||||
[377] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 94, warning: 1 characters of junk seen at toplevel
|
||||
[377] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 103, warning: 1 characters of junk seen at toplevel
|
||||
[377] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 112, warning: 1 characters of junk seen at toplevel
|
||||
[377] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 121, warning: 1 characters of junk seen at toplevel
|
||||
[377] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 127, warning: 1 characters of junk seen at toplevel
|
||||
[377] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 132, warning: 1 characters of junk seen at toplevel
|
||||
[377] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 137, warning: 1 characters of junk seen at toplevel
|
||||
[377] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 142, warning: 1 characters of junk seen at toplevel
|
||||
[377] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 153, warning: 1 characters of junk seen at toplevel
|
||||
[377] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 158, warning: 1 characters of junk seen at toplevel
|
||||
[377] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 164, warning: 1 characters of junk seen at toplevel
|
||||
[377] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 170, warning: 1 characters of junk seen at toplevel
|
||||
[378] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 175, warning: 1 characters of junk seen at toplevel
|
||||
[378] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 184, warning: 1 characters of junk seen at toplevel
|
||||
[378] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 191, warning: 1 characters of junk seen at toplevel
|
||||
[378] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 199, warning: 1 characters of junk seen at toplevel
|
||||
[378] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 206, warning: 1 characters of junk seen at toplevel
|
||||
[378] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 215, warning: 1 characters of junk seen at toplevel
|
||||
[378] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 224, warning: 1 characters of junk seen at toplevel
|
||||
[378] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 233, warning: 1 characters of junk seen at toplevel
|
||||
[378] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 239, warning: 1 characters of junk seen at toplevel
|
||||
[378] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 244, warning: 1 characters of junk seen at toplevel
|
||||
[378] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 249, warning: 1 characters of junk seen at toplevel
|
||||
[378] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 256, warning: 1 characters of junk seen at toplevel
|
||||
[378] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 261, warning: 1 characters of junk seen at toplevel
|
||||
[378] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 266, warning: 1 characters of junk seen at toplevel
|
||||
[378] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 271, warning: 1 characters of junk seen at toplevel
|
||||
[378] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 276, warning: 1 characters of junk seen at toplevel
|
||||
[378] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 283, warning: 1 characters of junk seen at toplevel
|
||||
[378] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 288, warning: 1 characters of junk seen at toplevel
|
||||
[378] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 295, warning: 1 characters of junk seen at toplevel
|
||||
[378] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 302, warning: 1 characters of junk seen at toplevel
|
||||
[379] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 309, warning: 1 characters of junk seen at toplevel
|
||||
[379] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 315, warning: 1 characters of junk seen at toplevel
|
||||
[379] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 321, warning: 1 characters of junk seen at toplevel
|
||||
[379] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 327, warning: 1 characters of junk seen at toplevel
|
||||
[379] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 334, warning: 1 characters of junk seen at toplevel
|
||||
[379] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 339, warning: 1 characters of junk seen at toplevel
|
||||
[379] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 344, warning: 1 characters of junk seen at toplevel
|
||||
[379] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 349, warning: 1 characters of junk seen at toplevel
|
||||
[379] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 356, warning: 1 characters of junk seen at toplevel
|
||||
[379] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 361, warning: 1 characters of junk seen at toplevel
|
||||
[379] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 366, warning: 1 characters of junk seen at toplevel
|
||||
[379] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 375, warning: 1 characters of junk seen at toplevel
|
||||
[379] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 380, warning: 1 characters of junk seen at toplevel
|
||||
[379] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 385, warning: 1 characters of junk seen at toplevel
|
||||
[379] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 390, warning: 1 characters of junk seen at toplevel
|
||||
[379] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 395, warning: 1 characters of junk seen at toplevel
|
||||
[379] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 400, warning: 1 characters of junk seen at toplevel
|
||||
[379] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 405, warning: 1 characters of junk seen at toplevel
|
||||
[379] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 410, warning: 1 characters of junk seen at toplevel
|
||||
[379] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 419, warning: 1 characters of junk seen at toplevel
|
||||
[379] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 428, warning: 1 characters of junk seen at toplevel
|
||||
[379] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 433, warning: 1 characters of junk seen at toplevel
|
||||
[380] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 438, warning: 1 characters of junk seen at toplevel
|
||||
[380] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 443, warning: 1 characters of junk seen at toplevel
|
||||
[380] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 449, warning: 1 characters of junk seen at toplevel
|
||||
[380] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 459, warning: 1 characters of junk seen at toplevel
|
||||
[380] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 466, warning: 1 characters of junk seen at toplevel
|
||||
[380] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 473, warning: 1 characters of junk seen at toplevel
|
||||
[380] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 482, warning: 1 characters of junk seen at toplevel
|
||||
[380] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 487, warning: 1 characters of junk seen at toplevel
|
||||
[380] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 492, warning: 1 characters of junk seen at toplevel
|
||||
[380] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 501, warning: 1 characters of junk seen at toplevel
|
||||
[380] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 508, warning: 1 characters of junk seen at toplevel
|
||||
[380] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 515, warning: 1 characters of junk seen at toplevel
|
||||
[380] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 520, warning: 1 characters of junk seen at toplevel
|
||||
[380] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_frH7/f4d088b3f9f145b5c3058da33afd57d4_272885.utf8, line 529, warning: 1 characters of junk seen at toplevel
|
||||
[427] UCollate.pm:68> INFO - Overriding locale 'en-US' defaults 'variable = shifted' with 'variable = non-ignorable'
|
||||
[427] UCollate.pm:68> INFO - Overriding locale 'en-US' defaults 'normalization = NFD' with 'normalization = prenormalized'
|
||||
[427] Biber.pm:4168> INFO - Sorting list 'none/global//global/global' of type 'entry' with template 'none' and locale 'en-US'
|
||||
[427] Biber.pm:4174> INFO - No sort tailoring available for locale 'en-US'
|
||||
[467] bbl.pm:654> INFO - Writing 'document.bbl' with encoding 'UTF-8'
|
||||
[485] bbl.pm:757> INFO - Output to document.bbl
|
||||
[485] Biber.pm:128> INFO - WARNINGS: 80
|
||||
[60] biber:340> INFO - === Tue Jun 7, 2022, 14:31:23
|
||||
[76] Biber.pm:415> INFO - Reading 'document.bcf'
|
||||
[153] Biber.pm:952> INFO - Found 77 citekeys in bib section 0
|
||||
[168] Biber.pm:4340> INFO - Processing section 0
|
||||
[179] Biber.pm:4531> INFO - Looking for bibtex format file 'bibliography/bibliography.bib' for section 0
|
||||
[182] bibtex.pm:1689> INFO - LaTeX decoding ...
|
||||
[211] bibtex.pm:1494> INFO - Found BibTeX data source 'bibliography/bibliography.bib'
|
||||
[406] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 9, warning: 1 characters of junk seen at toplevel
|
||||
[406] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 15, warning: 1 characters of junk seen at toplevel
|
||||
[406] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 22, warning: 1 characters of junk seen at toplevel
|
||||
[406] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 28, warning: 1 characters of junk seen at toplevel
|
||||
[406] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 35, warning: 1 characters of junk seen at toplevel
|
||||
[406] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 42, warning: 1 characters of junk seen at toplevel
|
||||
[406] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 50, warning: 1 characters of junk seen at toplevel
|
||||
[406] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 58, warning: 1 characters of junk seen at toplevel
|
||||
[406] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 65, warning: 1 characters of junk seen at toplevel
|
||||
[406] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 70, warning: 1 characters of junk seen at toplevel
|
||||
[406] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 77, warning: 1 characters of junk seen at toplevel
|
||||
[406] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 85, warning: 1 characters of junk seen at toplevel
|
||||
[406] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 94, warning: 1 characters of junk seen at toplevel
|
||||
[406] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 103, warning: 1 characters of junk seen at toplevel
|
||||
[406] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 112, warning: 1 characters of junk seen at toplevel
|
||||
[406] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 121, warning: 1 characters of junk seen at toplevel
|
||||
[406] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 127, warning: 1 characters of junk seen at toplevel
|
||||
[406] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 132, warning: 1 characters of junk seen at toplevel
|
||||
[407] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 137, warning: 1 characters of junk seen at toplevel
|
||||
[407] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 142, warning: 1 characters of junk seen at toplevel
|
||||
[407] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 153, warning: 1 characters of junk seen at toplevel
|
||||
[407] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 158, warning: 1 characters of junk seen at toplevel
|
||||
[407] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 164, warning: 1 characters of junk seen at toplevel
|
||||
[407] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 170, warning: 1 characters of junk seen at toplevel
|
||||
[407] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 175, warning: 1 characters of junk seen at toplevel
|
||||
[407] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 184, warning: 1 characters of junk seen at toplevel
|
||||
[407] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 191, warning: 1 characters of junk seen at toplevel
|
||||
[407] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 199, warning: 1 characters of junk seen at toplevel
|
||||
[407] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 206, warning: 1 characters of junk seen at toplevel
|
||||
[407] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 215, warning: 1 characters of junk seen at toplevel
|
||||
[407] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 224, warning: 1 characters of junk seen at toplevel
|
||||
[407] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 233, warning: 1 characters of junk seen at toplevel
|
||||
[407] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 239, warning: 1 characters of junk seen at toplevel
|
||||
[407] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 244, warning: 1 characters of junk seen at toplevel
|
||||
[407] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 249, warning: 1 characters of junk seen at toplevel
|
||||
[407] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 256, warning: 1 characters of junk seen at toplevel
|
||||
[407] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 261, warning: 1 characters of junk seen at toplevel
|
||||
[407] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 266, warning: 1 characters of junk seen at toplevel
|
||||
[407] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 271, warning: 1 characters of junk seen at toplevel
|
||||
[408] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 276, warning: 1 characters of junk seen at toplevel
|
||||
[408] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 283, warning: 1 characters of junk seen at toplevel
|
||||
[408] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 288, warning: 1 characters of junk seen at toplevel
|
||||
[408] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 295, warning: 1 characters of junk seen at toplevel
|
||||
[408] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 302, warning: 1 characters of junk seen at toplevel
|
||||
[408] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 309, warning: 1 characters of junk seen at toplevel
|
||||
[408] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 315, warning: 1 characters of junk seen at toplevel
|
||||
[408] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 321, warning: 1 characters of junk seen at toplevel
|
||||
[408] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 327, warning: 1 characters of junk seen at toplevel
|
||||
[408] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 334, warning: 1 characters of junk seen at toplevel
|
||||
[408] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 339, warning: 1 characters of junk seen at toplevel
|
||||
[408] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 344, warning: 1 characters of junk seen at toplevel
|
||||
[408] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 349, warning: 1 characters of junk seen at toplevel
|
||||
[408] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 356, warning: 1 characters of junk seen at toplevel
|
||||
[408] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 361, warning: 1 characters of junk seen at toplevel
|
||||
[408] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 366, warning: 1 characters of junk seen at toplevel
|
||||
[408] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 375, warning: 1 characters of junk seen at toplevel
|
||||
[408] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 380, warning: 1 characters of junk seen at toplevel
|
||||
[408] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 385, warning: 1 characters of junk seen at toplevel
|
||||
[408] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 390, warning: 1 characters of junk seen at toplevel
|
||||
[409] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 395, warning: 1 characters of junk seen at toplevel
|
||||
[409] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 400, warning: 1 characters of junk seen at toplevel
|
||||
[409] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 405, warning: 1 characters of junk seen at toplevel
|
||||
[409] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 410, warning: 1 characters of junk seen at toplevel
|
||||
[409] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 419, warning: 1 characters of junk seen at toplevel
|
||||
[409] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 428, warning: 1 characters of junk seen at toplevel
|
||||
[409] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 433, warning: 1 characters of junk seen at toplevel
|
||||
[409] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 438, warning: 1 characters of junk seen at toplevel
|
||||
[409] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 443, warning: 1 characters of junk seen at toplevel
|
||||
[409] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 449, warning: 1 characters of junk seen at toplevel
|
||||
[409] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 459, warning: 1 characters of junk seen at toplevel
|
||||
[409] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 466, warning: 1 characters of junk seen at toplevel
|
||||
[409] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 473, warning: 1 characters of junk seen at toplevel
|
||||
[409] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 482, warning: 1 characters of junk seen at toplevel
|
||||
[410] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 487, warning: 1 characters of junk seen at toplevel
|
||||
[410] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 492, warning: 1 characters of junk seen at toplevel
|
||||
[410] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 501, warning: 1 characters of junk seen at toplevel
|
||||
[410] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 508, warning: 1 characters of junk seen at toplevel
|
||||
[410] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 515, warning: 1 characters of junk seen at toplevel
|
||||
[410] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 520, warning: 1 characters of junk seen at toplevel
|
||||
[410] Utils.pm:384> WARN - BibTeX subsystem: /tmp/biber_tmp_Iaax/f4d088b3f9f145b5c3058da33afd57d4_281978.utf8, line 529, warning: 1 characters of junk seen at toplevel
|
||||
[458] UCollate.pm:68> INFO - Overriding locale 'en-US' defaults 'variable = shifted' with 'variable = non-ignorable'
|
||||
[458] UCollate.pm:68> INFO - Overriding locale 'en-US' defaults 'normalization = NFD' with 'normalization = prenormalized'
|
||||
[458] Biber.pm:4168> INFO - Sorting list 'none/global//global/global' of type 'entry' with template 'none' and locale 'en-US'
|
||||
[458] Biber.pm:4174> INFO - No sort tailoring available for locale 'en-US'
|
||||
[500] bbl.pm:654> INFO - Writing 'document.bbl' with encoding 'UTF-8'
|
||||
[518] bbl.pm:757> INFO - Output to document.bbl
|
||||
[518] Biber.pm:128> INFO - WARNINGS: 80
|
||||
|
||||
@@ -59,6 +59,8 @@
|
||||
\defcounter {refsection}{0}\relax
|
||||
\contentsline {figure}{\numberline {4.3}{\ignorespaces Executing arbitrary code exploiting a buffer overflow vulnerability.\relax }}{59}{figure.caption.51}%
|
||||
\defcounter {refsection}{0}\relax
|
||||
\contentsline {figure}{\numberline {4.4}{\ignorespaces Steps for executing code sample using ROP.\relax }}{61}{figure.caption.52}%
|
||||
\defcounter {refsection}{0}\relax
|
||||
\addvspace {10\p@ }
|
||||
\defcounter {refsection}{0}\relax
|
||||
\addvspace {10\p@ }
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
This is pdfTeX, Version 3.14159265-2.6-1.40.21 (TeX Live 2020/Debian) (preloaded format=pdflatex 2022.4.27) 7 JUN 2022 12:45
|
||||
This is pdfTeX, Version 3.14159265-2.6-1.40.21 (TeX Live 2020/Debian) (preloaded format=pdflatex 2022.4.27) 7 JUN 2022 15:38
|
||||
entering extended mode
|
||||
restricted \write18 enabled.
|
||||
%&-line parsing enabled.
|
||||
@@ -1089,7 +1089,7 @@ File: t1txss.fd 2000/12/15 v3.1
|
||||
)
|
||||
LaTeX Font Info: Font shape `T1/txss/m/n' will be
|
||||
(Font) scaled to size 11.39996pt on input line 186.
|
||||
<images//Portada_Logo.png, id=241, 456.2865pt x 45.99pt>
|
||||
<images//Portada_Logo.png, id=245, 456.2865pt x 45.99pt>
|
||||
File: images//Portada_Logo.png Graphic file (type png)
|
||||
<use images//Portada_Logo.png>
|
||||
Package pdftex.def Info: images//Portada_Logo.png used on input line 190.
|
||||
@@ -1102,7 +1102,7 @@ LaTeX Font Info: Font shape `T1/txss/m/n' will be
|
||||
(Font) scaled to size 23.63593pt on input line 201.
|
||||
LaTeX Font Info: Font shape `T1/txss/m/n' will be
|
||||
(Font) scaled to size 19.70294pt on input line 205.
|
||||
<images/creativecommons.png, id=243, 338.76563pt x 118.19156pt>
|
||||
<images/creativecommons.png, id=247, 338.76563pt x 118.19156pt>
|
||||
File: images/creativecommons.png Graphic file (type png)
|
||||
<use images/creativecommons.png>
|
||||
Package pdftex.def Info: images/creativecommons.png used on input line 215.
|
||||
@@ -1150,7 +1150,7 @@ l.279 \tableofcontents
|
||||
\tf@toc=\write6
|
||||
\openout6 = `document.toc'.
|
||||
|
||||
[8] [9] (./document.lof
|
||||
[8] [9] [10] (./document.lof
|
||||
LaTeX Font Info: Trying to load font information for OT1+txr on input line 8
|
||||
.
|
||||
|
||||
@@ -1180,20 +1180,20 @@ LaTeX Font Info: Trying to load font information for U+txsyc on input line 8
|
||||
|
||||
(/usr/share/texlive/texmf-dist/tex/latex/txfonts/utxsyc.fd
|
||||
File: utxsyc.fd 2000/12/15 v3.1
|
||||
) [10
|
||||
) [11
|
||||
|
||||
])
|
||||
\tf@lof=\write7
|
||||
\openout7 = `document.lof'.
|
||||
|
||||
[11] [12]
|
||||
(./document.lot [13
|
||||
[12] [13]
|
||||
(./document.lot [14
|
||||
|
||||
])
|
||||
\tf@lot=\write8
|
||||
\openout8 = `document.lot'.
|
||||
|
||||
[14] [15]
|
||||
[15] [16]
|
||||
Chapter 1.
|
||||
LaTeX Font Info: Trying to load font information for TS1+txr on input line 3
|
||||
30.
|
||||
@@ -1213,7 +1213,7 @@ Chapter 2.
|
||||
|
||||
LaTeX Warning: Reference `section:TODO' on page 5 undefined on input line 413.
|
||||
|
||||
<images//classic_bpf.jpg, id=622, 588.1975pt x 432.61626pt>
|
||||
<images//classic_bpf.jpg, id=634, 588.1975pt x 432.61626pt>
|
||||
File: images//classic_bpf.jpg Graphic file (type jpg)
|
||||
<use images//classic_bpf.jpg>
|
||||
Package pdftex.def Info: images//classic_bpf.jpg used on input line 427.
|
||||
@@ -1221,36 +1221,36 @@ Package pdftex.def Info: images//classic_bpf.jpg used on input line 427.
|
||||
[5
|
||||
|
||||
] [6 <./images//classic_bpf.jpg>]
|
||||
<images//cbpf_prog.jpg, id=640, 403.5075pt x 451.6875pt>
|
||||
<images//cbpf_prog.jpg, id=652, 403.5075pt x 451.6875pt>
|
||||
File: images//cbpf_prog.jpg Graphic file (type jpg)
|
||||
<use images//cbpf_prog.jpg>
|
||||
Package pdftex.def Info: images//cbpf_prog.jpg used on input line 454.
|
||||
(pdftex.def) Requested size: 227.62204pt x 254.80415pt.
|
||||
[7 <./images/cBPF_prog.jpg>]
|
||||
<images//bpf_instructions.png, id=650, 380.92313pt x 475.27562pt>
|
||||
<images//bpf_instructions.png, id=663, 380.92313pt x 475.27562pt>
|
||||
File: images//bpf_instructions.png Graphic file (type png)
|
||||
<use images//bpf_instructions.png>
|
||||
Package pdftex.def Info: images//bpf_instructions.png used on input line 494.
|
||||
(pdftex.def) Requested size: 227.62204pt x 283.99998pt.
|
||||
[8 <./images//bpf_instructions.png>]
|
||||
<images//bpf_address_mode.png, id=661, 417.05812pt x 313.67188pt>
|
||||
<images//bpf_address_mode.png, id=673, 417.05812pt x 313.67188pt>
|
||||
File: images//bpf_address_mode.png Graphic file (type png)
|
||||
<use images//bpf_address_mode.png>
|
||||
Package pdftex.def Info: images//bpf_address_mode.png used on input line 510.
|
||||
(pdftex.def) Requested size: 227.62204pt x 171.19905pt.
|
||||
[9 <./images//bpf_address_mode.png>]
|
||||
<images//tcpdump_example.png, id=673, 534.99875pt x 454.69875pt>
|
||||
<images//tcpdump_example.png, id=685, 534.99875pt x 454.69875pt>
|
||||
File: images//tcpdump_example.png Graphic file (type png)
|
||||
<use images//tcpdump_example.png>
|
||||
Package pdftex.def Info: images//tcpdump_example.png used on input line 525.
|
||||
(pdftex.def) Requested size: 284.52756pt x 241.82869pt.
|
||||
<images//cBPF_prog_ex_sol.png, id=676, 242.9075pt x 321.2pt>
|
||||
<images//cBPF_prog_ex_sol.png, id=688, 242.9075pt x 321.2pt>
|
||||
File: images//cBPF_prog_ex_sol.png Graphic file (type png)
|
||||
<use images//cBPF_prog_ex_sol.png>
|
||||
Package pdftex.def Info: images//cBPF_prog_ex_sol.png used on input line 536.
|
||||
(pdftex.def) Requested size: 170.71652pt x 225.74026pt.
|
||||
[10 <./images//tcpdump_example.png>] [11 <./images//cBPF_prog_ex_sol.png>]
|
||||
<images//ebpf_arch.jpg, id=694, 739.76375pt x 472.76625pt>
|
||||
<images//ebpf_arch.jpg, id=706, 739.76375pt x 472.76625pt>
|
||||
File: images//ebpf_arch.jpg Graphic file (type jpg)
|
||||
<use images//ebpf_arch.jpg>
|
||||
Package pdftex.def Info: images//ebpf_arch.jpg used on input line 575.
|
||||
@@ -1302,7 +1302,7 @@ Overfull \hbox (13.5802pt too wide) in paragraph at lines 760--790
|
||||
[]
|
||||
|
||||
[17]
|
||||
<images//xdp_diag.jpg, id=774, 649.42625pt x 472.76625pt>
|
||||
<images//xdp_diag.jpg, id=786, 649.42625pt x 472.76625pt>
|
||||
File: images//xdp_diag.jpg Graphic file (type jpg)
|
||||
<use images//xdp_diag.jpg>
|
||||
Package pdftex.def Info: images//xdp_diag.jpg used on input line 806.
|
||||
@@ -1313,7 +1313,7 @@ Overfull \hbox (5.80417pt too wide) in paragraph at lines 869--881
|
||||
[]
|
||||
|
||||
[20] [21] [22] [23]
|
||||
<images//libbpf_prog.jpg, id=833, 543.02875pt x 502.87875pt>
|
||||
<images//libbpf_prog.jpg, id=845, 543.02875pt x 502.87875pt>
|
||||
File: images//libbpf_prog.jpg Graphic file (type jpg)
|
||||
<use images//libbpf_prog.jpg>
|
||||
Package pdftex.def Info: images//libbpf_prog.jpg used on input line 979.
|
||||
@@ -1391,51 +1391,51 @@ read_user() and bpf_probe_read_kernel().
|
||||
[]
|
||||
|
||||
[35]
|
||||
<images//mem_arch_pages.jpg, id=1016, 593.21625pt x 434.62375pt>
|
||||
<images//mem_arch_pages.jpg, id=1028, 593.21625pt x 434.62375pt>
|
||||
File: images//mem_arch_pages.jpg Graphic file (type jpg)
|
||||
<use images//mem_arch_pages.jpg>
|
||||
Package pdftex.def Info: images//mem_arch_pages.jpg used on input line 1350.
|
||||
(pdftex.def) Requested size: 369.88582pt x 271.00914pt.
|
||||
[36]
|
||||
<images//mem_major_page_fault.jpg, id=1024, 639.38875pt x 425.59pt>
|
||||
<images//mem_major_page_fault.jpg, id=1036, 639.38875pt x 425.59pt>
|
||||
File: images//mem_major_page_fault.jpg Graphic file (type jpg)
|
||||
<use images//mem_major_page_fault.jpg>
|
||||
Package pdftex.def Info: images//mem_major_page_fault.jpg used on input line 1
|
||||
360.
|
||||
(pdftex.def) Requested size: 312.9803pt x 208.32661pt.
|
||||
[37 <./images//mem_arch_pages.jpg>]
|
||||
<images//mem_minor_page_fault.jpg, id=1031, 654.445pt x 555.07375pt>
|
||||
<images//mem_minor_page_fault.jpg, id=1044, 654.445pt x 555.07375pt>
|
||||
File: images//mem_minor_page_fault.jpg Graphic file (type jpg)
|
||||
<use images//mem_minor_page_fault.jpg>
|
||||
Package pdftex.def Info: images//mem_minor_page_fault.jpg used on input line 1
|
||||
368.
|
||||
(pdftex.def) Requested size: 312.9803pt x 265.45834pt.
|
||||
<images//memory.jpg, id=1032, 310.15875pt x 569.12625pt>
|
||||
<images//memory.jpg, id=1045, 310.15875pt x 569.12625pt>
|
||||
File: images//memory.jpg Graphic file (type jpg)
|
||||
<use images//memory.jpg>
|
||||
Package pdftex.def Info: images//memory.jpg used on input line 1379.
|
||||
(pdftex.def) Requested size: 170.71652pt x 313.25488pt.
|
||||
[38 <./images//mem_major_page_fault.jpg> <./images//mem_minor_page_fault.jpg>]
|
||||
[39 <./images//memory.jpg>]
|
||||
<images//stack_pres.jpg, id=1046, 707.64375pt x 283.0575pt>
|
||||
<images//stack_pres.jpg, id=1058, 707.64375pt x 283.0575pt>
|
||||
File: images//stack_pres.jpg Graphic file (type jpg)
|
||||
<use images//stack_pres.jpg>
|
||||
Package pdftex.def Info: images//stack_pres.jpg used on input line 1403.
|
||||
(pdftex.def) Requested size: 398.33858pt x 159.33606pt.
|
||||
|
||||
[40 <./images//stack_pres.jpg>]
|
||||
<images//stack_ops.jpg, id=1055, 524.96124pt x 694.595pt>
|
||||
<images//stack_ops.jpg, id=1067, 524.96124pt x 694.595pt>
|
||||
File: images//stack_ops.jpg Graphic file (type jpg)
|
||||
<use images//stack_ops.jpg>
|
||||
Package pdftex.def Info: images//stack_ops.jpg used on input line 1437.
|
||||
(pdftex.def) Requested size: 284.52756pt x 376.47473pt.
|
||||
[41]
|
||||
<images//stack_before.jpg, id=1060, 712.6625pt x 315.1775pt>
|
||||
<images//stack_before.jpg, id=1072, 712.6625pt x 315.1775pt>
|
||||
File: images//stack_before.jpg Graphic file (type jpg)
|
||||
<use images//stack_before.jpg>
|
||||
Package pdftex.def Info: images//stack_before.jpg used on input line 1448.
|
||||
(pdftex.def) Requested size: 398.33858pt x 176.16635pt.
|
||||
<images//stack.jpg, id=1061, 707.64375pt x 381.425pt>
|
||||
<images//stack.jpg, id=1073, 707.64375pt x 381.425pt>
|
||||
File: images//stack.jpg Graphic file (type jpg)
|
||||
<use images//stack.jpg>
|
||||
Package pdftex.def Info: images//stack.jpg used on input line 1455.
|
||||
@@ -1447,7 +1447,7 @@ Overfull \hbox (3.09538pt too wide) in paragraph at lines 1499--1500
|
||||
bpf_probe_read_user()
|
||||
[]
|
||||
|
||||
<images//stack_scan_write_tech.jpg, id=1100, 829.0975pt x 315.1775pt>
|
||||
<images//stack_scan_write_tech.jpg, id=1112, 829.0975pt x 315.1775pt>
|
||||
File: images//stack_scan_write_tech.jpg Graphic file (type jpg)
|
||||
<use images//stack_scan_write_tech.jpg>
|
||||
Package pdftex.def Info: images//stack_scan_write_tech.jpg used on input line
|
||||
@@ -1463,14 +1463,14 @@ Overfull \hbox (28.45273pt too wide) in paragraph at lines 1515--1516
|
||||
LaTeX Warning: Reference `TODO' on page 46 undefined on input line 1537.
|
||||
|
||||
[46 <./images//stack_scan_write_tech.jpg>] [47]
|
||||
<images//frame.jpg, id=1147, 695.59875pt x 705.63625pt>
|
||||
<images//frame.jpg, id=1159, 695.59875pt x 705.63625pt>
|
||||
File: images//frame.jpg Graphic file (type jpg)
|
||||
<use images//frame.jpg>
|
||||
Package pdftex.def Info: images//frame.jpg used on input line 1573.
|
||||
(pdftex.def) Requested size: 398.33858pt x 404.07954pt.
|
||||
[48 <./images//frame.jpg>]
|
||||
[49]
|
||||
<images//tcp_conn.jpg, id=1167, 452.69125pt x 405.515pt>
|
||||
<images//tcp_conn.jpg, id=1180, 452.69125pt x 405.515pt>
|
||||
File: images//tcp_conn.jpg Graphic file (type jpg)
|
||||
<use images//tcp_conn.jpg>
|
||||
Package pdftex.def Info: images//tcp_conn.jpg used on input line 1621.
|
||||
@@ -1482,14 +1482,14 @@ e-quence of <SYN>, <SYN+ACK>,
|
||||
[]
|
||||
|
||||
[50 <./images//tcp_conn.jpg>]
|
||||
<images//tcp_retransmission.jpg, id=1175, 523.9575pt x 485.815pt>
|
||||
<images//tcp_retransmission.jpg, id=1187, 523.9575pt x 485.815pt>
|
||||
File: images//tcp_retransmission.jpg Graphic file (type jpg)
|
||||
<use images//tcp_retransmission.jpg>
|
||||
Package pdftex.def Info: images//tcp_retransmission.jpg used on input line 163
|
||||
7.
|
||||
(pdftex.def) Requested size: 341.43306pt x 316.58401pt.
|
||||
[51 <./images//tcp_retransmission.jpg>] [52]
|
||||
<images//tcp_exfiltrate_retrans.jpg, id=1192, 633.36626pt x 475.7775pt>
|
||||
<images//tcp_exfiltrate_retrans.jpg, id=1204, 633.36626pt x 475.7775pt>
|
||||
File: images//tcp_exfiltrate_retrans.jpg Graphic file (type jpg)
|
||||
<use images//tcp_exfiltrate_retrans.jpg>
|
||||
Package pdftex.def Info: images//tcp_exfiltrate_retrans.jpg used on input line
|
||||
@@ -1501,158 +1501,177 @@ Chapter 4.
|
||||
[55
|
||||
|
||||
]
|
||||
<images//stack_ret_hij_simple.jpg, id=1210, 774.895pt x 674.52pt>
|
||||
<images//stack_ret_hij_simple.jpg, id=1223, 774.895pt x 674.52pt>
|
||||
File: images//stack_ret_hij_simple.jpg Graphic file (type jpg)
|
||||
<use images//stack_ret_hij_simple.jpg>
|
||||
Package pdftex.def Info: images//stack_ret_hij_simple.jpg used on input line 1
|
||||
730.
|
||||
(pdftex.def) Requested size: 426.79134pt x 371.51205pt.
|
||||
[56] [57 <./images//stack_ret_hij_simple.jpg>]
|
||||
<images//buffer_overflow.jpg, id=1229, 707.64375pt x 343.2825pt>
|
||||
<images//buffer_overflow.jpg, id=1241, 707.64375pt x 343.2825pt>
|
||||
File: images//buffer_overflow.jpg Graphic file (type jpg)
|
||||
<use images//buffer_overflow.jpg>
|
||||
Package pdftex.def Info: images//buffer_overflow.jpg used on input line 1756.
|
||||
Package pdftex.def Info: images//buffer_overflow.jpg used on input line 1755.
|
||||
(pdftex.def) Requested size: 426.79134pt x 207.03964pt.
|
||||
<images//buffer_overflow_shellcode.jpg, id=1231, 707.64375pt x 379.4175pt>
|
||||
<images//buffer_overflow_shellcode.jpg, id=1243, 707.64375pt x 379.4175pt>
|
||||
File: images//buffer_overflow_shellcode.jpg Graphic file (type jpg)
|
||||
<use images//buffer_overflow_shellcode.jpg>
|
||||
Package pdftex.def Info: images//buffer_overflow_shellcode.jpg used on input l
|
||||
ine 1767.
|
||||
ine 1766.
|
||||
(pdftex.def) Requested size: 426.79134pt x 228.8333pt.
|
||||
[58 <./images//buffer_overflow.jpg>]
|
||||
|
||||
LaTeX Warning: Reference `TODO probably an Annex' on page 59 undefined on input
|
||||
line 1772.
|
||||
line 1771.
|
||||
|
||||
|
||||
LaTeX Warning: Reference `TODO' on page 59 undefined on input line 1782.
|
||||
LaTeX Warning: Reference `TODO' on page 59 undefined on input line 1781.
|
||||
|
||||
[59 <./images//buffer_overflow_shellcode.jpg>]
|
||||
|
||||
LaTeX Warning: Citation 'rop_prog_finder' on page 60 undefined on input line 17
|
||||
90.
|
||||
|
||||
<images//ROPcompound.jpg, id=1259, 1296.845pt x 790.955pt>
|
||||
File: images//ROPcompound.jpg Graphic file (type jpg)
|
||||
<use images//ROPcompound.jpg>
|
||||
Package pdftex.def Info: images//ROPcompound.jpg used on input line 1803.
|
||||
(pdftex.def) Requested size: 455.24408pt x 277.65909pt.
|
||||
|
||||
Overfull \hbox (28.45273pt too wide) in paragraph at lines 1803--1804
|
||||
[][]
|
||||
[]
|
||||
|
||||
[60]
|
||||
|
||||
LaTeX Warning: Reference `TODO' on page 61 undefined on input line 1815.
|
||||
|
||||
[61 <./images//ROPcompound.jpg>] [62]
|
||||
Chapter 5.
|
||||
[60
|
||||
[63
|
||||
|
||||
]
|
||||
Chapter 6.
|
||||
[61
|
||||
[64
|
||||
|
||||
]
|
||||
Overfull \hbox (5.34976pt too wide) in paragraph at lines 1817--1817
|
||||
Overfull \hbox (5.34976pt too wide) in paragraph at lines 1852--1852
|
||||
\T1/txtt/m/n/12 threat -[] intelligence / cyber -[] year -[] in -[] retrospect
|
||||
/ yir -[] cyber -[] threats -[]
|
||||
[]
|
||||
|
||||
[62
|
||||
[65
|
||||
|
||||
|
||||
]
|
||||
Overfull \hbox (6.22696pt too wide) in paragraph at lines 1817--1817
|
||||
Overfull \hbox (6.22696pt too wide) in paragraph at lines 1852--1852
|
||||
[]\T1/txr/m/it/12 Bpf fea-tures by linux ker-nel ver-sion\T1/txr/m/n/12 , io-vi
|
||||
-sor. [On-line]. Avail-able: [][]$\T1/txtt/m/n/12 https : / / github .
|
||||
[]
|
||||
|
||||
|
||||
Overfull \hbox (7.34976pt too wide) in paragraph at lines 1817--1817
|
||||
Overfull \hbox (7.34976pt too wide) in paragraph at lines 1852--1852
|
||||
[][]$\T1/txtt/m/n/12 https : / / ebpf . io / what -[] is -[] ebpf / #loader -[]
|
||||
-[] verification -[] architecture$[][]\T1/txr/m/n/12 .
|
||||
[]
|
||||
|
||||
|
||||
Overfull \hbox (21.24973pt too wide) in paragraph at lines 1817--1817
|
||||
Overfull \hbox (21.24973pt too wide) in paragraph at lines 1852--1852
|
||||
\T1/txtt/m/n/12 vger . kernel . org / netconf2015Starovoitov -[] bpf _ collabsu
|
||||
mmit _ 2015feb20 .
|
||||
[]
|
||||
|
||||
[63]
|
||||
Overfull \hbox (9.14975pt too wide) in paragraph at lines 1817--1817
|
||||
[66]
|
||||
Overfull \hbox (9.14975pt too wide) in paragraph at lines 1852--1852
|
||||
\T1/txtt/m/n/12 ch02 . xhtml# :-[]: text = With % 20JIT % 20compiled % 20code %
|
||||
2C % 20i ,[] %20other %
|
||||
[]
|
||||
|
||||
|
||||
Overfull \hbox (6.49615pt too wide) in paragraph at lines 1817--1817
|
||||
Overfull \hbox (6.49615pt too wide) in paragraph at lines 1852--1852
|
||||
[]\T1/txr/m/n/12 D. Lavie. ^^P A gen-tle in-tro-duc-tion to xdp.^^Q (Feb. 3, 2
|
||||
022), [On-line]. Avail-able: [][]$\T1/txtt/m/n/12 https :
|
||||
[]
|
||||
|
||||
[64]
|
||||
Overfull \hbox (0.76683pt too wide) in paragraph at lines 1817--1817
|
||||
[67]
|
||||
Overfull \hbox (0.76683pt too wide) in paragraph at lines 1852--1852
|
||||
[]\T1/txr/m/n/12 ^^P Bpf next ker-nel tree.^^Q (), [On-line]. Avail-able: [][]
|
||||
$\T1/txtt/m/n/12 https : / / kernel . googlesource .
|
||||
[]
|
||||
|
||||
|
||||
Overfull \hbox (14.49278pt too wide) in paragraph at lines 1817--1817
|
||||
Overfull \hbox (14.49278pt too wide) in paragraph at lines 1852--1852
|
||||
[]\T1/txr/m/it/12 Capabilities - overview of linux ca-pa-bil-i-ties\T1/txr/m/n/
|
||||
12 . [On-line]. Avail-able: [][]$\T1/txtt/m/n/12 http : / / manpages .
|
||||
[]
|
||||
|
||||
[65]
|
||||
Overfull \hbox (53.32059pt too wide) in paragraph at lines 1817--1817
|
||||
[68]
|
||||
Overfull \hbox (53.32059pt too wide) in paragraph at lines 1852--1852
|
||||
\T1/txr/m/it/12 sup-ple-ment\T1/txr/m/n/12 , Jan. 28, 2018, p. 148. [On-line].
|
||||
Avail-able: [][]$\T1/txtt/m/n/12 https : / / raw . githubusercontent .
|
||||
[]
|
||||
|
||||
|
||||
Overfull \hbox (33.3497pt too wide) in paragraph at lines 1817--1817
|
||||
Overfull \hbox (33.3497pt too wide) in paragraph at lines 1852--1852
|
||||
\T1/txtt/m/n/12 20CON % 2029 % 20presentations / Guillaume % 20Fournier % 20Syl
|
||||
vain % 20Afchain %
|
||||
[]
|
||||
|
||||
|
||||
Overfull \hbox (9.33742pt too wide) in paragraph at lines 1817--1817
|
||||
Overfull \hbox (9.33742pt too wide) in paragraph at lines 1852--1852
|
||||
\T1/txr/m/n/12 Avail-able: [][]$\T1/txtt/m/n/12 https : / / events19 . linuxfou
|
||||
ndation . org / wp -[] content / uploads /
|
||||
[]
|
||||
|
||||
|
||||
Overfull \hbox (18.44974pt too wide) in paragraph at lines 1817--1817
|
||||
Overfull \hbox (18.44974pt too wide) in paragraph at lines 1852--1852
|
||||
\T1/txtt/m/n/12 2017 / 12 / MM -[] 101 -[] Introduction -[] to -[] Linux -[] Me
|
||||
mory -[] Management -[] Christoph -[]
|
||||
[]
|
||||
|
||||
|
||||
Overfull \hbox (5.92503pt too wide) in paragraph at lines 1817--1817
|
||||
Overfull \hbox (5.92503pt too wide) in paragraph at lines 1852--1852
|
||||
[]\T1/txr/m/n/12 D. Breaker. ^^P Un-der-stand-ing page faults and mem-ory swap
|
||||
-in/outs.^^Q (Aug. 19, 2019),
|
||||
[]
|
||||
|
||||
|
||||
Overfull \hbox (40.56133pt too wide) in paragraph at lines 1817--1817
|
||||
Overfull \hbox (40.56133pt too wide) in paragraph at lines 1852--1852
|
||||
\T1/txr/m/n/12 able: [][]$\T1/txtt/m/n/12 https : / / h3xduck . github . io / e
|
||||
xploit / 2021 / 05 / 23 / stackbufferoverflow -[]
|
||||
[]
|
||||
|
||||
|
||||
Overfull \hbox (47.32059pt too wide) in paragraph at lines 1817--1817
|
||||
Overfull \hbox (47.32059pt too wide) in paragraph at lines 1852--1852
|
||||
\T1/txr/m/it/12 sup-ple-ment\T1/txr/m/n/12 , Jan. 28, 2018, p. 18. [On-line]. A
|
||||
vail-able: [][]$\T1/txtt/m/n/12 https : / / raw . githubusercontent .
|
||||
[]
|
||||
|
||||
[66]
|
||||
Overfull \hbox (11.10025pt too wide) in paragraph at lines 1817--1817
|
||||
[69]
|
||||
Overfull \hbox (11.10025pt too wide) in paragraph at lines 1852--1852
|
||||
\T1/txr/m/n/12 DE-F-CON 27, pp. 69^^U74. [On-line]. Avail-able: [][]$\T1/txtt/m
|
||||
/n/12 https : / / raw . githubusercontent .
|
||||
[]
|
||||
|
||||
|
||||
Overfull \hbox (39.98859pt too wide) in paragraph at lines 1817--1817
|
||||
Overfull \hbox (39.98859pt too wide) in paragraph at lines 1852--1852
|
||||
\T1/txr/m/it/12 ment\T1/txr/m/n/12 , Jan. 28, 2018, pp. 19^^U22. [On-line]. Ava
|
||||
il-able: [][]$\T1/txtt/m/n/12 https : / / raw . githubusercontent .
|
||||
[]
|
||||
|
||||
|
||||
Overfull \hbox (21.2149pt too wide) in paragraph at lines 1817--1817
|
||||
Overfull \hbox (21.2149pt too wide) in paragraph at lines 1852--1852
|
||||
\T1/txr/m/n/12 line]. Avail-able: [][]$\T1/txtt/m/n/12 https : / / www . plixer
|
||||
. com / blog / network -[] layers -[] explained/$[][]\T1/txr/m/n/12 .
|
||||
[]
|
||||
|
||||
|
||||
Overfull \hbox (4.29944pt too wide) in paragraph at lines 1817--1817
|
||||
Overfull \hbox (4.29944pt too wide) in paragraph at lines 1852--1852
|
||||
[]\T1/txr/m/n/12 ^^P Trans-mis-sion con-trol pro-to-col,^^Q IBM. (Apr. 19, 202
|
||||
2), [On-line]. Avail-able: [][]$\T1/txtt/m/n/12 https :
|
||||
[]
|
||||
|
||||
[67] (/usr/share/texlive/texmf-dist/tex/latex/listings/lstlang1.sty
|
||||
[70] (/usr/share/texlive/texmf-dist/tex/latex/listings/lstlang1.sty
|
||||
File: lstlang1.sty 2020/03/24 1.8d listings language file
|
||||
)
|
||||
(/usr/share/texlive/texmf-dist/tex/latex/listings/lstlang1.sty
|
||||
@@ -1663,30 +1682,29 @@ File: lstlang1.sty 2020/03/24 1.8d listings language file
|
||||
been already used, duplicate ignored
|
||||
<to be read again>
|
||||
\relax
|
||||
l.1877 \end{document}
|
||||
l.1912 \end{document}
|
||||
[2
|
||||
|
||||
] (./document.aux)
|
||||
|
||||
LaTeX Warning: There were undefined references.
|
||||
|
||||
Package rerunfilecheck Info: File `document.out' has not changed.
|
||||
(rerunfilecheck) Checksum: A0D9888CF217B41DB9D86D22513DB939;4682.
|
||||
|
||||
Package rerunfilecheck Warning: File `document.out' has changed.
|
||||
(rerunfilecheck) Rerun to get outlines right
|
||||
(rerunfilecheck) or use package `bookmark'.
|
||||
Package biblatex Warning: Please (re)run Biber on the file:
|
||||
(biblatex) document
|
||||
(biblatex) and rerun LaTeX afterwards.
|
||||
|
||||
Package rerunfilecheck Info: Checksums for `document.out':
|
||||
(rerunfilecheck) Before: 5294F3D5A17A6EC3C46845D3EEAB2EF6;4593
|
||||
(rerunfilecheck) After: 7F97C08A6EE704EC164C376D592ADDCD;4579.
|
||||
Package logreq Info: Writing requests to 'document.run.xml'.
|
||||
\openout1 = `document.run.xml'.
|
||||
|
||||
)
|
||||
Here is how much of TeX's memory you used:
|
||||
28578 strings out of 481209
|
||||
455998 string characters out of 5914747
|
||||
1354008 words of memory out of 5000000
|
||||
44676 multiletter control sequences out of 15000+600000
|
||||
28602 strings out of 481209
|
||||
456331 string characters out of 5914747
|
||||
1353969 words of memory out of 5000000
|
||||
44687 multiletter control sequences out of 15000+600000
|
||||
459242 words of font info for 106 fonts, out of 8000000 for 9000
|
||||
36 hyphenation exceptions out of 8191
|
||||
88i,12n,90p,1029b,3693s stack positions out of 5000i,500n,10000p,200000b,80000s
|
||||
@@ -1702,9 +1720,9 @@ e/texmf-dist/fonts/type1/urw/helvetic/uhvb8a.pfb></usr/share/texlive/texmf-dist
|
||||
/urw/helvetic/uhvr8a.pfb></usr/share/texlive/texmf-dist/fonts/type1/urw/times/u
|
||||
tmb8a.pfb></usr/share/texlive/texmf-dist/fonts/type1/urw/times/utmr8a.pfb></usr
|
||||
/share/texlive/texmf-dist/fonts/type1/urw/times/utmri8a.pfb>
|
||||
Output written on document.pdf (86 pages, 1639730 bytes).
|
||||
Output written on document.pdf (90 pages, 1838612 bytes).
|
||||
PDF statistics:
|
||||
1592 PDF objects out of 1728 (max. 8388607)
|
||||
389 named destinations out of 1000 (max. 500000)
|
||||
620 words of extra memory for PDF output out of 10000 (max. 10000000)
|
||||
1631 PDF objects out of 1728 (max. 8388607)
|
||||
401 named destinations out of 1000 (max. 500000)
|
||||
633 words of extra memory for PDF output out of 10000 (max. 10000000)
|
||||
|
||||
|
||||
@@ -54,6 +54,7 @@
|
||||
\BOOKMARK [0][-]{chapter.4}{Design\040of\040a\040malicious\040eBPF\040rootkit}{}% 54
|
||||
\BOOKMARK [1][-]{section.4.1}{Library\040injection\040via\040.GOT\040hijacking}{chapter.4}% 55
|
||||
\BOOKMARK [2][-]{subsection.4.1.1}{Attacks\040at\040the\040stack:\040buffer\040overflow}{section.4.1}% 56
|
||||
\BOOKMARK [0][-]{chapter.5}{Results}{}% 57
|
||||
\BOOKMARK [0][-]{chapter.6}{Conclusion\040and\040future\040work}{}% 58
|
||||
\BOOKMARK [0][-]{chapter.6}{Bibliography}{}% 59
|
||||
\BOOKMARK [2][-]{subsection.4.1.2}{Return\040oriented\040programming\040with\040eBPF}{section.4.1}% 57
|
||||
\BOOKMARK [0][-]{chapter.5}{Results}{}% 58
|
||||
\BOOKMARK [0][-]{chapter.6}{Conclusion\040and\040future\040work}{}% 59
|
||||
\BOOKMARK [0][-]{chapter.6}{Bibliography}{}% 60
|
||||
|
||||
Binary file not shown.
@@ -41,7 +41,7 @@
|
||||
>
|
||||
]>
|
||||
<requests version="1.0">
|
||||
<internal package="biblatex" priority="9" active="0">
|
||||
<internal package="biblatex" priority="9" active="1">
|
||||
<generic>latex</generic>
|
||||
<provides type="dynamic">
|
||||
<file>document.bcf</file>
|
||||
@@ -63,7 +63,7 @@
|
||||
<file>english.lbx</file>
|
||||
</requires>
|
||||
</internal>
|
||||
<external package="biblatex" priority="5" active="0">
|
||||
<external package="biblatex" priority="5" active="1">
|
||||
<generic>biber</generic>
|
||||
<cmdline>
|
||||
<binary>biber</binary>
|
||||
|
||||
Binary file not shown.
@@ -1509,7 +1509,7 @@ Then, if we attach a kprobe to vfs\_read, we would be able to modify the value o
|
||||
\end{itemize}
|
||||
|
||||
Figure \ref{fig:stack_scan_write_tech} illustrates a high-level overview of the stack scanning technique previously described:
|
||||
|
||||
%TODO i just noticed I included SFP outside the current stack frame, correct it here and everywhere
|
||||
\begin{figure}[H]
|
||||
\centering
|
||||
\includegraphics[width=16cm]{stack_scan_write_tech.jpg}
|
||||
@@ -1737,7 +1737,6 @@ In the figure, we can observe how, during the execution of the called function,
|
||||
Attackers have historically used multiple techniques to overwrite the ret value in the stack, being the stack buffer overflow one of the most popular. In this technique, an attacker takes advantage of a program receiving an user value stored in a buffer whose capacity is smaller of that of the supplied value. Code snippet \ref{code:vuln_overflow} shows an example of a vulnerable program:
|
||||
|
||||
\begin{lstlisting}[language=C, caption={Program vulnerable to buffer overflow.}, label={code:vuln_overflow}]
|
||||
#include <string.h>
|
||||
void foo(char *bar){ // bar may be larger than 12 characters
|
||||
char buffer[12];
|
||||
strcpy(buffer, bar); //no bounds checking
|
||||
@@ -1781,6 +1780,42 @@ As we can observe in the figure, the attacker will take advantage of the buffer
|
||||
|
||||
By using eBPF, we should in principle be able to overwrite the stack, inject shellcode, overwrite ret and then execute our malicious code. However, the classic buffer overflow is one of the oldest techniques in binary exploitation, and thus numerous protections have historically been incorporated and thus the attack presented here does not work work in modern systems any more. One of the protections is the prohibition of executing code from the stack. By marking the stack as non-executable, in the case of rip pointing to an address in the stack any malicious code will not be ran, even if an application was vulnerable to a buffer overflow. We will explain more in detail the main protections that nowadays are incorporated in modern systems in section \ref{TODO}.
|
||||
|
||||
\subsection{Return oriented programming with eBPF}
|
||||
After the stack was marked non-executable, a new refined technique was invented to circumvent this restriction and adapt the classic buffer overflow to modern systems. In the end, attackers still maintained the ability to overflow the buffer in the stack of vulnerable applications, writing shellcode and overwriting ret, the only issue was that the shellcode could not be executed.
|
||||
|
||||
Return Oriented Programming (ROP) is an exploitation technique that takes advantage of the fact that, even if malicious code in the stack cannot be executed, the attacker can still redirect the flow of execution by modifying ret to any other piece of executable code. The challenge for the attacker is executing malicious code, since any available executable instructions are either at the .text section (which will correspond to the normal functioning of the program) or at shared libraries, but none are useful for malware.
|
||||
|
||||
ROP tackles this challenge by designing a method of reconstructing malicious code from parts of already-existing code, as in a 'collage'. Assembly instructions are selected from multiple places, so that, when put together and executed sequentially, they recreate the shellcode which the attacker wants to execute. These pieces of code are called ROP gadgets, and consist of a set of arbitrary instructions followed by a final \textit{ret} instruction, which triggers the function exit and pops the value of ret. These gadgets may belong to any code in the process memory, usually selected between the code of the shared libraries (see figure \ref{fig:stack}) to which the process is linked.
|
||||
|
||||
Finding ROP gadgets and writing ROP-compatible payloads manually is hard, thus multiple programs exist that automatically scan the system libraries and construct provide the gadgets given the shellcode to execute\cite{rop_prog_finder}.
|
||||
|
||||
However, we will now illustrate how ROP works with an example. Suppose that an attacker has discovered a buffer overflow vulnerability, but the stack is marked as not executable. The attacker wants to execute the assembly code shown in snippet \ref{code:rop_ex}:
|
||||
|
||||
\begin{lstlisting}[language=C, caption={Sample program to run using ROP.}, label={code:rop_ex}]
|
||||
mov rdx, 10
|
||||
mov rax, [rsp]
|
||||
\end{lstlisting}
|
||||
|
||||
After finding the address of the ROP gadgets manually or using an automated tool, the attacker takes advantage of a buffer overflow (or, in our case, a direct write using eBPF's bpf\_probe\_write\_user()) to overwrite the vale of ret with the address of the first ROP gadget, and also additional data in the stack. Figure \ref{fig:rop_compund} shows how we can execute the original program using ROP:
|
||||
|
||||
\begin{figure}[H]
|
||||
\centering
|
||||
\includegraphics[width=16cm]{ROPcompound.jpg}
|
||||
\caption{Steps for executing code sample using ROP.}
|
||||
\label{fig:rop_compund}
|
||||
\end{figure}
|
||||
|
||||
The steps described in the figure are the following:
|
||||
\begin{enumerate}
|
||||
\item First step shows the two gadgets located and their addresses, and the overwritten data in the stack. The function has already exited and, because ret was overwritten with the address of the first gadget, register rip now points to that location, and thus it is the next instruction to execute. Register rsp, in turn, now points to the bottom address of the current stack frame, which is right next to the old ret (see section \ref{subsection:stack} for stack frames functioning).
|
||||
\item The first instruction of the gadget is executed, popping the value from the stack (which also moves register rsp, see stack push and pop operations in section \ref{subsection:stack}). As we can observe, the value "10" was specifically put in that position by the attacker, so that, according to the instruction to execute \lstinline{mov rdx, 10} \lstinline{}, we now have loaded that data into register rdx.
|
||||
\item The return instruction is executed, which pops from the stack what is supposed to be the value of the saved rip, but in turn the attacker has placed the address of the next gadget there. Now, rip has jumped to the address of the second gadget. By continuing with this process, we can chain an infinite number of gadgets.
|
||||
\item Finally, we repeated the same process as before, using a pop instruction to load a value from the stack. This illustrates that push and pop instructions, commonly used on most programs, are also possible to be using ROP.
|
||||
|
||||
After this step, the return instruction will be executed. Note that, at this point, if the attacker wants to be stealthy and avoid crashing the program (since we overwrote the original data in the stack), the original stack must be restored, together with the value of the registers before the malicious code execution. We will see an example of a technique for reconstructing the original state during our explanation of the library injection in section \ref{TODO}.
|
||||
\end{enumerate}
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -113,9 +113,11 @@
|
||||
\defcounter {refsection}{0}\relax
|
||||
\contentsline {subsection}{\numberline {4.1.1}Attacks at the stack: buffer overflow}{56}{subsection.4.1.1}%
|
||||
\defcounter {refsection}{0}\relax
|
||||
\contentsline {chapter}{\numberline {5}Results}{60}{chapter.5}%
|
||||
\contentsline {subsection}{\numberline {4.1.2}Return oriented programming with eBPF}{60}{subsection.4.1.2}%
|
||||
\defcounter {refsection}{0}\relax
|
||||
\contentsline {chapter}{\numberline {6}Conclusion and future work}{61}{chapter.6}%
|
||||
\contentsline {chapter}{\numberline {5}Results}{63}{chapter.5}%
|
||||
\defcounter {refsection}{0}\relax
|
||||
\contentsline {chapter}{Bibliography}{62}{chapter.6}%
|
||||
\contentsline {chapter}{\numberline {6}Conclusion and future work}{64}{chapter.6}%
|
||||
\defcounter {refsection}{0}\relax
|
||||
\contentsline {chapter}{Bibliography}{65}{chapter.6}%
|
||||
\contentsfinish
|
||||
|
||||
BIN
docs/images/ROPcompound.jpg
Normal file
BIN
docs/images/ROPcompound.jpg
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 185 KiB |
@@ -73,15 +73,15 @@
|
||||
</rdf:Description>
|
||||
<rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/">
|
||||
<xmp:CreatorTool>LaTeX with hyperref</xmp:CreatorTool>
|
||||
<xmp:ModifyDate>2022-06-07T12:45:09-04:00</xmp:ModifyDate>
|
||||
<xmp:CreateDate>2022-06-07T12:45:09-04:00</xmp:CreateDate>
|
||||
<xmp:MetadataDate>2022-06-07T12:45:09-04:00</xmp:MetadataDate>
|
||||
<xmp:ModifyDate>2022-06-07T15:38:18-04:00</xmp:ModifyDate>
|
||||
<xmp:CreateDate>2022-06-07T15:38:18-04:00</xmp:CreateDate>
|
||||
<xmp:MetadataDate>2022-06-07T15:38:18-04:00</xmp:MetadataDate>
|
||||
</rdf:Description>
|
||||
<rdf:Description rdf:about="" xmlns:xmpRights = "http://ns.adobe.com/xap/1.0/rights/">
|
||||
</rdf:Description>
|
||||
<rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/">
|
||||
<xmpMM:DocumentID>uuid:467B87E0-A1EA-A037-7CB7-0477245DEBC3</xmpMM:DocumentID>
|
||||
<xmpMM:InstanceID>uuid:F42E26B8-7248-CA5C-5651-8E1F5F7A10AB</xmpMM:InstanceID>
|
||||
<xmpMM:InstanceID>uuid:FFC22840-A5D2-811D-B4DC-552224123B21</xmpMM:InstanceID>
|
||||
</rdf:Description>
|
||||
</rdf:RDF>
|
||||
</x:xmpmeta>
|
||||
|
||||
Reference in New Issue
Block a user