return address overwrite strategies
Return address overwrite strategies are techniques used by attackers to overwrite the return address of a computer program's execution stack with a malicious address, redirecting the program's flow of execution to a different location in memory.
Requires login.
Related Concepts (18)
- address space layout randomization (aslr) bypass techniques
- binary exploitation techniques
- buffer overflow attacks
- code injection
- control-flow hijacking
- data execution prevention (dep) bypass techniques
- format string vulnerabilities
- function pointers manipulation
- heap overflow attacks
- heap spraying techniques
- information leakage
- nop sleds
- return address chaining
- return-oriented programming (rop)
- return-to-libc attacks
- shellcode injection
- stack canaries
- stack smashing
Similar Concepts
- address randomization techniques
- addressing modes
- conflict resolution strategies
- delegation strategies
- function pointer overwriting
- memory address
- memory allocation strategies
- offensive strategies
- outsourcing strategies
- resource allocation strategies
- return address integrity
- return address manipulation
- return address overwrite
- strategies
- work assignment strategies