Gehen Sie mit der App Player FM offline!
0x07 Memory Corruption1
Fetch error
Hmmm there seems to be a problem fetching this series right now. Last successful fetch was on April 07, 2024 09:06 ()
What now? This series will be checked again in the next day. If you believe it should be working, please verify the publisher's feed link below is valid and includes actual episode links. You can contact support to request the feed be immediately fetched.
Manage episode 247909799 series 2582136
Diese Episode handelt von Memory-Corruption Schwachstellen. Die letzte Whatsapp-Schwachstelle zeigte wieder eindrucksvoll dass Memory-Corruption Schwachstellen lange nicht der Vergangenheit angehören. In dieser Folge möchten wir über stack-based Buffer Overflows sprechen.
Shownotes:- Segfault.fm Episode 0x06 Android Hardening
- CVE-2019-3568
- arstechnica: WhatsApp vulnerability exploited to infect phones with Israeli spyware
- osxdaily:Serious FaceTime Bug Allows Eavesdropping of Microphone on iPhone & Mac
- NSO Group
- CitizenLab
- Memory Corruption Attacks: The almost complete history
- WP: Morris Worm
- Aleph One: Smashing the stack for fun and profit
- WP: Virtual Memory
- WP: Cold Boot Attack
- WP: ELF Format
- WP: PE Format
- WP: DOS MZ Executable
- WP: Stack (Data Type)
- WP: Call Stack
- WP: X86 Register
- WP: Return Address
- WP: Memory Hierarchy
- Gute Visualisierung von Codebashing
- CERN: Common vulnerabilities guide for C programmers
- Protostar (Archive)
- Root Me
- Smash The Stack Wargammes Network
- WP: Shellcode
- Shellcode Datenbank
- Metasploit
- WP: NOP slide, NOP sled oder NOP ramp
- WP: Von Neumann Architecture
- WP: Executable space protection
- History: Non-Executable Stack
- WP: Return-to-libc attack
- WP: C Standard Library
- WP: Dynamic Linker
- Paper: Return-Oriented Programming without Returns (2010a)
- WP: Stack_canaries
- WP: Format String Attack
- WP: Address Space Layout Randomization
- WP: Position-independent_code (PIE)
- Go Programming Language
- Rust Lang
- WP: Control-flow Integrity
- Microsoft: SafeStr
- CERT Secure C Conding Standard
- WP: Fuzzing
- American Fuzzy Loop (AFL)
Kapitel
1. Intro (00:00:00)
2. Begrüßung (00:00:56)
3. Whatsapp Schwachstelle (CVE-2019-3568) (00:01:45)
4. Einführung in Buffer overflows (00:14:20)
5. Geschichte der Stack-Based Buffer Overflows (00:19:00)
6. Aufbau des Speichers eines Programms zur Laufzeit (00:26:33)
7. Der Stack (00:41:20)
8. Der Heap (00:48:40)
9. Stack Frame (00:55:54)
10. Register (01:05:00)
11. Programmablauf (01:08:40)
12. Einfacher Stack-Based Buffer Overflow (01:12:05)
13. Shellcode (01:26:11)
14. NOP Slide (01:36:11)
15. Nicht-ausführbarer Stack (01:44:51)
16. Return-to-Libc (01:48:17)
17. Return-Oriented Programming (ROP) (02:02:16)
18. Stack Canaries (02:11:09)
19. Address Space Layout Randomization (02:17:47)
20. Was ist mit Hochsprachen? (02:22:12)
21. Gegenmaßnahmen 1 (02:24:01)
22. Control-flow Integrity (02:26:23)
23. Gegenmaßnahmen 2 (02:31:26)
24. Verabschiedung (02:39:39)
25. Outro (02:41:33)
43 Episoden
Fetch error
Hmmm there seems to be a problem fetching this series right now. Last successful fetch was on April 07, 2024 09:06 ()
What now? This series will be checked again in the next day. If you believe it should be working, please verify the publisher's feed link below is valid and includes actual episode links. You can contact support to request the feed be immediately fetched.
Manage episode 247909799 series 2582136
Diese Episode handelt von Memory-Corruption Schwachstellen. Die letzte Whatsapp-Schwachstelle zeigte wieder eindrucksvoll dass Memory-Corruption Schwachstellen lange nicht der Vergangenheit angehören. In dieser Folge möchten wir über stack-based Buffer Overflows sprechen.
Shownotes:- Segfault.fm Episode 0x06 Android Hardening
- CVE-2019-3568
- arstechnica: WhatsApp vulnerability exploited to infect phones with Israeli spyware
- osxdaily:Serious FaceTime Bug Allows Eavesdropping of Microphone on iPhone & Mac
- NSO Group
- CitizenLab
- Memory Corruption Attacks: The almost complete history
- WP: Morris Worm
- Aleph One: Smashing the stack for fun and profit
- WP: Virtual Memory
- WP: Cold Boot Attack
- WP: ELF Format
- WP: PE Format
- WP: DOS MZ Executable
- WP: Stack (Data Type)
- WP: Call Stack
- WP: X86 Register
- WP: Return Address
- WP: Memory Hierarchy
- Gute Visualisierung von Codebashing
- CERN: Common vulnerabilities guide for C programmers
- Protostar (Archive)
- Root Me
- Smash The Stack Wargammes Network
- WP: Shellcode
- Shellcode Datenbank
- Metasploit
- WP: NOP slide, NOP sled oder NOP ramp
- WP: Von Neumann Architecture
- WP: Executable space protection
- History: Non-Executable Stack
- WP: Return-to-libc attack
- WP: C Standard Library
- WP: Dynamic Linker
- Paper: Return-Oriented Programming without Returns (2010a)
- WP: Stack_canaries
- WP: Format String Attack
- WP: Address Space Layout Randomization
- WP: Position-independent_code (PIE)
- Go Programming Language
- Rust Lang
- WP: Control-flow Integrity
- Microsoft: SafeStr
- CERT Secure C Conding Standard
- WP: Fuzzing
- American Fuzzy Loop (AFL)
Kapitel
1. Intro (00:00:00)
2. Begrüßung (00:00:56)
3. Whatsapp Schwachstelle (CVE-2019-3568) (00:01:45)
4. Einführung in Buffer overflows (00:14:20)
5. Geschichte der Stack-Based Buffer Overflows (00:19:00)
6. Aufbau des Speichers eines Programms zur Laufzeit (00:26:33)
7. Der Stack (00:41:20)
8. Der Heap (00:48:40)
9. Stack Frame (00:55:54)
10. Register (01:05:00)
11. Programmablauf (01:08:40)
12. Einfacher Stack-Based Buffer Overflow (01:12:05)
13. Shellcode (01:26:11)
14. NOP Slide (01:36:11)
15. Nicht-ausführbarer Stack (01:44:51)
16. Return-to-Libc (01:48:17)
17. Return-Oriented Programming (ROP) (02:02:16)
18. Stack Canaries (02:11:09)
19. Address Space Layout Randomization (02:17:47)
20. Was ist mit Hochsprachen? (02:22:12)
21. Gegenmaßnahmen 1 (02:24:01)
22. Control-flow Integrity (02:26:23)
23. Gegenmaßnahmen 2 (02:31:26)
24. Verabschiedung (02:39:39)
25. Outro (02:41:33)
43 Episoden
Alle Folgen
×Willkommen auf Player FM!
Player FM scannt gerade das Web nach Podcasts mit hoher Qualität, die du genießen kannst. Es ist die beste Podcast-App und funktioniert auf Android, iPhone und im Web. Melde dich an, um Abos geräteübergreifend zu synchronisieren.