return-to-libc attacks
"Return-to-libc attacks are a type of software vulnerability where an attacker exploits a buffer overflow to manipulate the program's return address, redirecting it to execute malicious actions using existing code libraries instead of injecting new code."
Requires login.
Related Concepts (24)
- address space layout randomization (aslr)
- binary exploitation techniques
- buffer overflow attacks
- buffer overflow vulnerability
- code injection
- control hijacking
- control-flow hijacking
- data execution prevention (dep)
- data execution prevention (dep) bypass
- dynamic memory allocation
- heap exploitation
- heap-based buffer overflow
- nop sled
- return address overwrite strategies
- return oriented programming (rop)
- return-oriented programming
- rop (return-oriented programming) attacks
- shellcode
- stack exploitation
- stack frame
- stack smashing
- stack smashing protection (ssp)
- stack smashing techniques
- stack-based buffer overflow
Similar Concepts
- code injection attacks
- code reuse attacks
- decompiler attacks
- glibc heap exploitation
- hacker attacks
- leakage-based attacks
- remote code execution (rce) attacks
- remote code execution attacks
- return to libc technique
- return-oriented programming (rop) attacks
- return-oriented programming attacks
- return-to-libc attack
- shellcode injection attacks
- side-channel attacks
- stack-based attacks