在Ubuntu中进行缓冲区溢出攻击 [英] Practicing buffer overflow attack in Ubuntu

查看:413
本文介绍了在Ubuntu中进行缓冲区溢出攻击的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我正在尝试学习在Ubuntu中使用缓冲区溢出攻击.不幸的是,我无法关闭此操作系统中的地址空间布局随机化(ASLR)功能,该功能默认情况下处于打开状态.我已经尝试过一些在Fedora书籍中发现的问题:

I am trying to learn to use buffer overflow attack in Ubuntu. Unfortunately, I cannot turn off Address Space Layout Randomization (ASLR) feature in this OS, which is turned on by default. I have tried some work around found in some fedora books:

echo "0" > /proc/sys/kernel/randomize_va_space 

但是由于某种原因,保护仍然存在.请给我一些建议.谢谢.

but for some reason the protection's still there. Please give me some suggestions. Thanks.

[edit]实际上,即使使用sudo,上述命令也不成功,它说"Permission Denied".我该如何解决?

[edit]Actually the above command was not successful, it said "Permission Denied", even with sudo. How can I fix that?

[添加]当它在堆栈中显示一个地址时,我不断遇到隔离错误错误.它与ubuntu中的非可执行堆栈有关吗?:(?

[adding] I kept on getting segmetation fault error when it shows an address in stack. Is it related to non-executable stack in ubuntu :(?

推荐答案

在尝试之前,您将需要root权限,并且如果我没有记错的话,请在完成后重新启动.

You will need root perms before attempting it, and if I'm not mistaken, to restart once you've done it.

 sudo -i
 echo "0" > /proc/sys/kernel/randomize_va_space

这篇关于在Ubuntu中进行缓冲区溢出攻击的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆