How to bypass stack canary when exploit a stack-overflow vulnerability in user mode?

萝らか妹 提交于 2020-01-16 08:13:11

问题


In linux , there are many ways to bypass security mechanisms( like NX, ASLR) except canary. Actually, I find the stack canary is generated by the Linux kernel in /arch/arm/include/asm/stackprotector.h/boot_init_stack_canary() function.The random number is generated by extract_entropy function at last, and it's related to the environment noises such as the keyboad, the time interval of interruption.

Are there any ways to bypass canary security mechanism when exploit a stack-overflow vulnerability?


回答1:


In general the techniques for beating canaries is to use the correct value. Typically this can be done using either an information leak to obtain the correct value before overflowing the buffer onto the stack, or in some cases where the process starts again it is possible to brute force the correct value.



来源:https://stackoverflow.com/questions/36643072/how-to-bypass-stack-canary-when-exploit-a-stack-overflow-vulnerability-in-user-m

易学教程内所有资源均来自网络或用户发布的内容,如有违反法律规定的内容欢迎反馈
该文章没有解决你所遇到的问题?点击提问,说说你的问题,让更多的人一起探讨吧!