Skip to content

Latest commit

 

History

History
42 lines (24 loc) · 804 Bytes

bypassPie.md

File metadata and controls

42 lines (24 loc) · 804 Bytes

Bypass Pie

PIE binary and all of its dependencies are loaded into random locations each time the aplication is executed.

Leak addresses

PIE randomise address function, and can compromise ROP.

First of all, you need to find an address of a function and leak it.

printf

You can use format string attack to get addresses from the stack.

Exploit

To exploit leaked address you need to calculate the offset the target function.

Simple exemple:

gdb >

info function main
0xbfffb000

info function vuln
0xbfffa056

print 0xbfffb000-0xbfffa056
4010

If you add or sub offset to the leak address, you can call it.


↪️ Back Pwn