Jethro's Braindump


Exploitation (Halvar Flake)

  • Phrack
  • Stack Smashing
  • Heap Overflow
  • ASLR

Weird machines, exploitability, and provable unexploitability:

Finite State Machines

CPU States:

  1. Sane
  2. Transitory
  3. Weird States

Exploitation Procedure

  1. Setup (choose the right sane state)
  2. Instantiation (enter the weird state)
  3. Programming (program the weird state)

Attacker Specialization

  • Different version of the same “host” may create similar weird machines.