Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This is a bit interesting in how it doesn't require further interactivity with the attacker once the libc address has been obtained, unlike most basic ROP examples, which I've rarely seen require anything fancier than return-to-main. The more the chain does in a single pass, the more it might need gadgets smarter than "set register to immediate and return".


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: