Simply put: a memory control structure for memory allocated at runtime. This memory is allocated using new() or malloc(). Heap contains variable values which are also variable in size.BSS contains uninitialized static and global variables ex.Data contains initialized static and global variables ex.Text contains compiled and linked code to be executed in assembly.Stack (Going up from larger memory addresses to smaller ones)Īll of these segments have a specific function.Heap (Going downward from smaller memory addresses to larger ones).All have their own primary purpose which helps keep things clean. Memory in modern day computers is segmented into various different sections. Some Understanding of Memory and How It Works As soon as I learnt a few things, I was fascinated by how small holes in a programmer's code can be devastating for millions if not billions of users. My background ranges from ERP development to E-commerce development which soon led me into computer security. It is important that you do have some command of C or Assembly or are willing to find resources online that will further what I am teaching here. To catch a criminal, you must think like a criminal. In this case scenario, we will be taking a peek at 64bit buffer overflows. Buffer overflows are one of the biggest ones that will help you learn how to think the way a black hat hacker would think. Yet so if we ever want to work in the field of security and Ethical hacking, we need to know some skills of hacks that were very common in the bygone era. The long gone era of 32 bit and old school stack buffer overflows seems to have gone with the introduction of memory randomization, canary variables, ASLR and 64bit addresses (making it harder to escape bad bytes in shellcode).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |