Basic Binary Protections
Just some bad notes
Binary Protections (ASLR/PIE/NX)
if ASLR is enabled, need to leak an address from the memory region
offset between addresses will not change
PIE (Position Independent Executable)
ASLR for the actual binary’s code and memory regions
NX (Non-Executable)
Stack region of the memory is not executable
You can determine this using
vmap
Stack Canary
Random value placed at bottom of stack frame
if it is overwritten, then there is memory corruption (or in this case BOF) and terminates the program
Typical Stack Canary check in a binary
Using debugger to check the stack canary from RBP/EBP
Last updated