RE-basics-W22

Basics of Reverse Engineering Winter 2022

View on GitHub

Resources and links

==================[ Item 1: Dynamic linking mystery ]==========

See https://github.com/sergeybratus/RE-basics-W22/tree/main/day2-src/why-no-lazy-linking.txt

==================[ Item 2: History of memory corruption exploits ]========================

A classic paper in Phrack:

http://phrack.org/issues/58/4.html – “The advanced return-into-lib(c) exploits: PaX case study”, Nergal, Phrach 58:4, 2001.

History overviews of exploitation techniques, which led to adoption of NX/DEP and ASLR:

https://thinkst.com/resources/papers/BlackHat-USA-2010-Meer-History-of-Memory-Corruption-Attacks-wp.pdf “Memory Corruption Attacks: The (almost) Complete History”, Haroon Meer, BlackHat 2010 (see Timeline at p.9)

https://langsec.org/papers/Bratus.pdf — “Exploit Programming: from Buffer Overflows to Weird Machines and Theory of Computation”, 2011.

==================[ Item 3: Abusing relocation entries ]===========

http://uninformed.org/?v=6&a=3&t=pdf – “Locreate: An Anagram for Relocate - Uninformed.org”

https://www.cs.dartmouth.edu/~sergey/wm/woot13-shapiro.pdf – “Weird Machines” in ELF: A Spotlight on the Underappreciated Metadata, Shapiro et al., USENIX WOOT’13