Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for applying buffer overflowing on Intel-and-Linux64-integrated platform

A buffer overflow and platform technology, which is applied in the field of network security, can solve problems such as the method of exploiting few program overflows, and achieve the effect of increasing the scope of application

Inactive Publication Date: 2017-12-15
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the overflow exploits introduced so far are aimed at 32-bit platforms, and there are few reference methods for program overflow exploits on 64-bit platforms.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for applying buffer overflowing on Intel-and-Linux64-integrated platform
  • Method for applying buffer overflowing on Intel-and-Linux64-integrated platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The invention provides a buffer overflow utilization method on the Intel and Linux64 platform, based on the Linux64 platform system, the application program is compiled after closing stack protection, non-executable stack and ASLR compiler options;

[0024] Observe and record the register value pushed onto the stack at the beginning of the function, determine the offset of the character array to be overflowed, and use the offset and the recorded register value to construct the overflow content.

[0025] Use the constructed overflow content to overwrite the return address of the function to complete the return of the function.

[0026] At the same time, it provides a buffer overflow exploitation system on Intel and Linux64 platforms.

[0027] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with specific examples.

[0028] The platform of this e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for applying buffer overflowing on an Intel-and-Linux64-integrated platform, and relates to the technical field of network safety. Based on the fact that a series of registers can be subjected to stack pressing processing during function calling on a Linux 64-bit platform, register values stored on a stack can be quoted in a function achieving part; by applying program overflowing for covering a return address and determining an entry address of a function, the values, generated during stack pressing of the registers of a function beginning part, of the registers are recorded and used as a part of the overflowing content, and it is guaranteed that function returning is free of errors so that function collapse can be avoided. The method can also be applied into the penetration testing process, and the testing application range is expanded.

Description

technical field [0001] The invention discloses a buffer overflow utilization method, relates to the technical field of network security, and specifically relates to a buffer overflow utilization method on an Intel and Linux64 platform. Background technique [0002] In the field of network security, buffer overflow is a very common and very dangerous loophole, which exists widely in various operating systems and application software. The use of buffer overflow attacks can lead to consequences such as program failure, system downtime, and restart. Whats more serious is that it can be used to execute unauthorized instructions, and even obtain system privileges to perform various illegal operations. However, most of the overflow exploits introduced so far are aimed at 32-bit platforms, and there are few reference methods for program overflow exploits on 64-bit platforms. And the present invention provides a buffer overflow utilization method on the Intel and Linux64 platform, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/52G06F11/36
CPCG06F11/3624G06F21/52
Inventor 王鹏
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products