Hacking [Electronic resources] : The Art of Exploitation

Jon Erickson

نسخه متنی -صفحه : 60/ 43
نمايش فراداده

Index

F

Feistel network, 179

Felten, Edward, 3

fencepost error, 12

file permissions, multi-user, 15-16

FILO (first-in, last-out) ordering, 19, 105

FIN flag, 144

FIN packet, 163

FIN scans, 163, 166

fingerprints, SSH host, 189

first-in, last-out (FILO) ordering, 19, 105

FMS (Fluhrer, Mantin, and Shamir) attack, 217-27

fms.c file, 221-28

fmt_example.c code, 55-59

fmt_vuln program, 62, 77, 78, 80

fmt_vuln.c code, 59-61

format strings, 54-83

detours with dtors, 74-80

direct parameter access, 71-73

format-string vulnerability, 59-61

overwriting the global offset table, 80-83

and printf( ), 54-59

reading from arbitrary memory addresses, 61-62

writing to arbitrary memory addresses, 62-71

format-string program, 77, 80, 117-18

fraggle attack, 162

frame pointer (FP), 19

function pointers, overflowing, 46-54

functions, 10

fuzzy fingerprints, 192-96, 232