Unit Description
Learn how PIE and RELRO function as mitigation mechanisms, and explore bypass techniques using hook overwriting and One Gadget exploitation.
Objectives
Topics Covered
- Memory address randomization using PIE (Position-Independent Executable)
- ELF binary protection with RELRO (Relocation Read-Only)
- Understanding and practicing hooking and hook overwrite techniques
- Gaining a shell using One Gadget exploitation
Recommended For
- Those interested in system security
- Learners who want to understand vulnerabilities and bypass techniques
Prerequisite Knowledge
- Basic understanding of programming and system concepts
- Foundational knowledge of memory management and security techniques
Environment
- Linux environment based on x86-64 architecture (Ubuntu 22.04)
Composition
PIE
Background: PIE
Quiz: PIE
RELRO
Background: RELRO
Quiz: RELRO
[Exercise] Hook Overwrite
Exploit Tech: Hook Overwrite
fho
[Exercise] Hook Overwrite - 2
Exercise: hook
Exercise: oneshot
oneshot
hook
Rating
All items must be completed before leaving a rating feedback.
Bypassing PIE & RELRO
0% Completed
Total 0 completed
Lecture
0 /5
Wargame
0 /3
3
Quiz
0 /2
2