Implementing A Return Oriented Programming (ROP) Attack: A How-To Guide

Written by pwnbykenny | Published 2021/01/31
Tech Story Tags: rop | exploit | hacking | return-oriented-programming | how-to-rop-attack | rop-attack-guide | hacking-top-story | rop-attack-source-code

TLDR The exploitation process can be summarized by this workflow: bug -(overwrite)> return address -(jump)> gadgets -(jmp)> one gadget. The last gadget will direct the program to execute a one gadget, and we will have a shell. Find the gadgets within bug by running “ROPgadget –binary bug” and “vmmap” Find gadgets within the bug program’s libc file name and run “One_Gadget /usr/lib/x86_64-64-linux-gnu/libc-2.31.so.via the TL;DR App

no story

Written by pwnbykenny | A Ph.D. A Hacker. My personal website: https://pwnbykenny.com
Published by HackerNoon on 2021/01/31