Hacking [Electronic resources] : The Art of Exploitation

Jon Erickson

نسخه متنی -صفحه : 60/ 55
نمايش فراداده

Index

R

random photons, 176

read permission, 15

redirecting IP, 216

registers, 17

EAX register, 84

moving single byte from, 91, 96

and negative/non-negative EAX numbers, 100

pop and push instructions for, 105

use when making system calls, 88

zeroing out, 97, 98, 103, 104

EBP register, 19, 84

EBX register, 84, 88, 91

ECX register, 84, 88, 91

EDI register, 84

EDX register, 84, 88, 91-92, 100

EIP register, 84, 92

ESI register, 84

ESP register, 19, 84, 105

processor registers, 84

relatively prime, 180

return address., 19-20

return command, 165

returning into libc technique, 129

return-into-libc call, 135-36

Return Material Authorization (RMA), 143

Rieck, Konrad, 192

Rigaux, Pascal, 231

RMA (Return Material Authorization), 143

routers, 141

RSA Data Security, 174, 180

RSA key, 184, 188

RST flag, 144

RST hijacking, 157

RST packets, 157, 158, 163, 164, 166

runtime, algorithmic, 177-78