漏洞与 利用案例研究

发布于 2024-07-18 03:30:34 字数 200 浏览 10 评论 0原文

我了解如何利用漏洞的总体思路。 缓冲区溢出之类的东西,但我想我并没有真正理解它。

是否有有用的信息来源可以很好地解释该领域? 也许是关于如何利用特定漏洞的案例研究?

更有趣的是您从事的项目是如何遭受此类问题的。

我并不是想了解我可以利用的当前存在的漏洞。 我正在尝试了解这个领域如何对我可能从事的任何项目产生影响。

I understand the general idea of how vulnerabilities are exploited. Buffer overflows and stuff like that, but I guess I don't REALLY get it.

Are there useful sources of information that explain this area well? Maybe case studies about how particular vulnerabilities were exploited?

Even more interesting would be how projects you have worked on suffered from these kinds of issues.

I'm not trying to learn about currently existing vulnerabilities that I could exploit. I'm trying to get a feel for how this area could have an impact on any projects I may work on.

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。

评论(3

只为一人 2024-07-25 03:30:34

iss.net 有关于不同漏洞利用示例的文章,主要解释如何保护您的系统。

iss.net has articles on different examples of exploits, mainly explaining how to secure your system.

萌︼了一个春 2024-07-25 03:30:34

corelancoder教程! 必读
https: //www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/

第 1 部分是 Windows 上的单个 BOF,... ,第 12 部分是 ROP。 这很难,但第一个可以在一两天内完成,它应该让你真实地感受到编写漏洞时发现的困难,以及哪些对策是无用/有用的。

这个领域的问题是,除非你自己尝试一些东西,否则它是不清楚的,但这需要时间。 您还可以检查 Metasploit 来直接利用问题(以了解影响) - 您将找到可向目标发起攻击的漏洞列表。 如果您需要目标,请使用 Metasploitable http://www.offense-security.com /metasploit-unleashed/Requirements#Metasploitable

The corelancoder tutorial! A must read
https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/

Part 1 is a single BOF on windows, ... , Part 12 is ROP. It is hard, but the first one can be done in a day or two, and it should give you a real feeling on which difficulties one finds when writing an exploit, and on which countermeasures are useless/useful.

The problem with this area is that it is unclear until you try out something on your own, but that requires time. You could also check Metasploit to exploit problems directly (to have an idea of the impact) - you will find a list of exploit to fire to a target. If you need a target, use Metasploitable http://www.offensive-security.com/metasploit-unleashed/Requirements#Metasploitable

风蛊 2024-07-25 03:30:34

如果您想要现实生活中的实际例子,我完全推荐这本书
“漏洞猎人日记:软件安全领域的引导之旅”

这正是您想要的。 它充满了几乎所有类型的漏洞利用的案例研究和现实生活中的例子,并解释了从发现到完整编写有效漏洞利用的过程。

“The shellcoders handbook” 书中也有一些示例,但不如 “The bug Hunter's diary”“The shellcoders handbook” 全面code> 相当大,我只在需要时将其用作参考。

有时我也会继续阅读“http://www.exploit-db.com”中的漏洞利用程序,这很有帮助经常与我交流,但请记住,并非所有内容都可以教授,因此有时您需要根据您拥有的内容和您可以控制的内容进行即兴创作,一开始很难,但当漏洞运行并且您看到计算结果时,它会让您感觉很棒。 exe :)

当然,corlan 教程和其他教程是了解要点的必要条件,但它们只教您基本概念,您必须看到一些现实生活中的实际应用才能真正理解可能性。

If you want practical examples of real life exploits, I totally recommend the book
"A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security"

It's exactly what you want. It's full of case studies and real life examples of almost every type of exploits and it explains it from the finding to fully writing a working exploit.

Also there are some examples in the book "The shellcoders handbook" but it's not as comprehensive as "The bug hunter's diary" Also "The shellcoders handbook" is pretty big and I only use it as a reference when needed.

Also sometimes I keep reading exploits from "http://www.exploit-db.com" and it helped me a lot but keep in mind not everything can be taught so sometimes you will need to improvise based on what you have and what you can control it's hard at first but it will make you feel great when the exploit runs and you see that calc.exe :)

Of course corlan tutorials and other tutorials are a must to know the essentials but they only teach you the basic concepts and you have to see some real life exploits in action to really understand the possibilities.

~没有更多了~
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文