Skip to content

Commit b61aea7

Browse files
authored
Merge pull request #2049 from 7Rocky/master
Fix URLs
2 parents 90f963e + 633fc2e commit b61aea7

9 files changed

Lines changed: 14 additions & 15 deletions

File tree

src/SUMMARY.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -828,7 +828,7 @@
828828
- [Ret2win - arm64](binary-exploitation/stack-overflow/ret2win/ret2win-arm64.md)
829829
- [Stack Shellcode](binary-exploitation/stack-overflow/stack-shellcode/README.md)
830830
- [Stack Shellcode - arm64](binary-exploitation/stack-overflow/stack-shellcode/stack-shellcode-arm64.md)
831-
- [Stack Pivoting - EBP2Ret - EBP chaining](binary-exploitation/stack-overflow/stack-pivoting-ebp2ret-ebp-chaining.md)
831+
- [Stack Pivoting](binary-exploitation/stack-overflow/stack-pivoting.md)
832832
- [Uninitialized Variables](binary-exploitation/stack-overflow/uninitialized-variables.md)
833833
- [ROP & JOP](binary-exploitation/rop-return-oriented-programing/README.md)
834834
- [BROP - Blind Return Oriented Programming](binary-exploitation/rop-return-oriented-programing/brop-blind-return-oriented-programming.md)
@@ -839,15 +839,15 @@
839839
- [Leaking libc address with ROP](binary-exploitation/rop-return-oriented-programing/ret2lib/rop-leaking-libc-address/README.md)
840840
- [Leaking libc - template](binary-exploitation/rop-return-oriented-programing/ret2lib/rop-leaking-libc-address/rop-leaking-libc-template.md)
841841
- [One Gadget](binary-exploitation/rop-return-oriented-programing/ret2lib/one-gadget.md)
842-
- [Ret2lib + Printf leak - arm64](binary-exploitation/rop-return-oriented-programing/ret2lib/ret2lib-+-printf-leak-arm64.md)
842+
- [Ret2lib + Printf leak - arm64](binary-exploitation/rop-return-oriented-programing/ret2lib/ret2lib-printf-leak-arm64.md)
843843
- [Ret2syscall](binary-exploitation/rop-return-oriented-programing/rop-syscall-execv/README.md)
844-
- [Ret2syscall - ARM64](binary-exploitation/rop-return-oriented-programing/rop-syscall-execv/ret2syscall-arm64.md)
844+
- [Ret2syscall - arm64](binary-exploitation/rop-return-oriented-programing/rop-syscall-execv/ret2syscall-arm64.md)
845845
- [Ret2vDSO](binary-exploitation/rop-return-oriented-programing/ret2vdso.md)
846846
- [SROP - Sigreturn-Oriented Programming](binary-exploitation/rop-return-oriented-programing/srop-sigreturn-oriented-programming/README.md)
847-
- [SROP - ARM64](binary-exploitation/rop-return-oriented-programing/srop-sigreturn-oriented-programming/srop-arm64.md)
847+
- [SROP - arm64](binary-exploitation/rop-return-oriented-programing/srop-sigreturn-oriented-programming/srop-arm64.md)
848848
- [Mediatek Xflash Carbonara Da2 Hash Bypass](hardware-physical-access/firmware-analysis/mediatek-xflash-carbonara-da2-hash-bypass.md)
849849
- [Synology Encrypted Archive Decryption](hardware-physical-access/firmware-analysis/synology-encrypted-archive-decryption.md)
850-
- [Windows Seh Overflow](binary-exploitation/stack-overflow/windows-seh-overflow.md)
850+
- [Windows SEH Overflow](binary-exploitation/stack-overflow/windows-seh-overflow.md)
851851
- [Array Indexing](binary-exploitation/array-indexing.md)
852852
- [Chrome Exploiting](binary-exploitation/chrome-exploiting.md)
853853
- [Common Exploiting Problems Unsafe Relocation Fixups](binary-exploitation/common-exploiting-problems-unsafe-relocation-fixups.md)

src/binary-exploitation/basic-stack-binary-exploitation-methodology/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ Something to take into account is that usually **just one exploitation of a vuln
101101

102102
#### Via EBP/RBP
103103

104-
- [**Stack Pivoting / EBP2Ret / EBP Chaining**](../stack-overflow/stack-pivoting-ebp2ret-ebp-chaining.md): Control the ESP to control RET through the stored EBP in the stack.
104+
- [**Stack Pivoting**](../stack-overflow/stack-pivoting.md): Control the ESP to control RET through the stored EBP in the stack.
105105
- Useful for **off-by-one** stack overflows
106106
- Useful as an alternate way to end controlling EIP while abusing EIP to construct the payload in memory and then jumping to it via EBP
107107

src/binary-exploitation/common-binary-protections-and-bypasses/aslr/ret2ret.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
1-
# Ret2ret & Reo2pop
1+
# Ret2ret & Ret2pop
22

33
{{#include ../../../banners/hacktricks-training.md}}
44

55
## Ret2ret
66

77
The main **goal** of this technique is to try to **bypass ASLR by abusing an existing pointer in the stack**.
88

9-
Basically, stack overflows are usually caused by strings, and **strings end with a null byte at the end** in memory. This allows to try to reduce the place pointed by na existing pointer already existing n the stack. So if the stack contained `0xbfffffdd`, this overflow could transform it into `0xbfffff00` (note the last zeroed byte).
9+
Basically, stack overflows are usually caused by strings, and **strings end with a null byte at the end** in memory. This allows to try to reduce the place pointed by an existing pointer already existing on the stack. So if the stack contained `0xbfffffdd`, this overflow could transform it into `0xbfffff00` (note the last zeroed byte).
1010

1111
If that address points to our shellcode in the stack, it's possible to make the flow reach that address by **adding addresses to the `ret` instruction** util this one is reached.
1212

src/binary-exploitation/rop-return-oriented-programing/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -316,7 +316,7 @@ rop-syscall-execv/
316316

317317

318318
{{#ref}}
319-
../stack-overflow/stack-pivoting-ebp2ret-ebp-chaining.md
319+
../stack-overflow/stack-pivoting.md
320320
{{#endref}}
321321

322322
## Other Examples & References

src/binary-exploitation/rop-return-oriented-programing/ret2lib/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ Also in ARM64 an instruction does what the instruction does (it's not possible t
136136
Check the example from:
137137

138138
{{#ref}}
139-
ret2lib-+-printf-leak-arm64.md
139+
ret2lib-printf-leak-arm64.md
140140
{{#endref}}
141141

142142
## Ret-into-printf (or puts)

src/binary-exploitation/rop-return-oriented-programing/ret2lib/ret2lib-+-printf-leak-arm64.md renamed to src/binary-exploitation/rop-return-oriented-programing/ret2lib/ret2lib-printf-leak-arm64.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Ret2lib + Printf leak - arm64
1+
# Ret2lib + Printf leak - ARM64
22

33
{{#include ../../../banners/hacktricks-training.md}}
44

src/binary-exploitation/stack-overflow/ret2win/ret2win-arm64.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -515,7 +515,7 @@ gdb-multiarch ./ret2win -ex 'target remote :1234'
515515

516516

517517
{{#ref}}
518-
../../rop-return-oriented-programing/ret2lib/ret2lib-+-printf-leak-arm64.md
518+
../../rop-return-oriented-programing/ret2lib/ret2lib-printf-leak-arm64.md
519519
{{#endref}}
520520

521521

src/binary-exploitation/stack-overflow/stack-pivoting-ebp2ret-ebp-chaining.md renamed to src/binary-exploitation/stack-overflow/stack-pivoting.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Stack Pivoting - EBP2Ret - EBP chaining
1+
# Stack Pivoting
22

33
{{#include ../../banners/hacktricks-training.md}}
44

@@ -11,7 +11,6 @@ As a reminder, on x86/x86-64 **`leave`** is equivalent to:
1111
```
1212
mov rsp, rbp ; mov esp, ebp on x86
1313
pop rbp ; pop ebp on x86
14-
ret
1514
```
1615

1716
And as the saved **EBP/RBP is in the stack** before the saved EIP/RIP, it's possible to control it by controlling the stack.

src/generic-methodologies-and-resources/basic-forensic-methodology/specific-software-file-type-tricks/office-file-analysis.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ call qword ptr [rax] ; one attacker-chosen gadget per object
8383
See Windows x64 pivot/gadget building details here:
8484

8585
{{#ref}}
86-
../../../binary-exploitation/stack-overflow/stack-pivoting-ebp2ret-ebp-chaining.md
86+
../../../binary-exploitation/stack-overflow/stack-pivoting.md
8787
{{#endref}}
8888

8989
and general ROP guidance here:

0 commit comments

Comments
 (0)