Next
Previous
Contents
Andries Brouwer,
2003-04-01
Some random hacking hints, mainly from a Linux point of view.
Next Previous Contents
Andries Brouwer, aeb@cwi.nl
2003-04-01
Some random hacking hints, mainly from a Linux point of view.
1. Preliminary
2. Introduction
3. Discovery
4. Password Cracking
- 4.1 Common passwords
- 4.2 Unix password algorithms
- 4.3 MySQL passwords
- 4.4 ZIP passwords
- 4.5 PDF passwords
- 4.6 Avoiding brute force
- 4.7 Time-memory tradeoff
- 4.8 Side channels and timing
- 4.9 Captchas - protection by image
5. Active data
- 5.1 Nostalgia
- 5.2 Terminals and terminal emulators
- 5.3 Editors
- 5.4 Formatters
- 5.5 printf - format string exploits
6. Data injection into scripts
7. Options and whitespace
8. Environment variables
- 8.1 Buffer overflow
- 8.2 HOME
- 8.3 LD_LIBRARY_PATH
- 8.4 LD_DEBUG
- 8.5 PATH
- 8.6 NLSPATH
- 8.7 IFS
- 8.8 Misleading trusting programs
- 8.9 system() and popen()
- 8.10 Setuid binaries
9. Race conditions
10. Smashing The Stack
- 10.1 Shellcodes
- 10.2 Programming details
- 10.3 Non-executable stack
- 10.4 Returning into libc
- 10.5 Returning into libc - getting root
- 10.6 Address randomization
- 10.7 Returning via
linux-gate.so.1 - 10.8 Return-oriented programming
- 10.9 Printable shellcodes
- 10.10 Integer overflow
- 10.11 Stack/heap collision
11. Exploiting the heap
12. Local root exploits
- 12.1 A Linux example - ptrace
- 12.2 A Linux example - prctl
- 12.3 A Linux example - a race in procfs
- 12.4 A Linux integer overflow - vmsplice
- 12.5 A Linux NULL pointer exploit
- 12.6 An Irix example
- 12.7 The Unix permission system
- 12.8 Modified system environment
13. Stealth
14. ELF
15. Networking
- 15.1 Sender spoofing
- 15.2 ARP cache poisoning
- 15.3 TCP sequence numbers
- 15.4 Hijack a TCP session
- 15.5 DNS cache poisoning
- 15.6 NFS - No File Security
- 15.7 Exploiting scanners
- 15.8 Simple Denial of Service attacks
16. Remote root exploits
17. Browsers
18. Viruses and Worms
19. Wifi and War Driving
20. References
- 20.1 Literature / Fiction / History
- 20.2 Social engineering
- 20.3 Introductory
- 20.4 Black Hat Info
- 20.5 White Hat Info
- 20.6 Tools
- 20.7 Warning
Next Previous Contents