Unit Description
Learn how PIE and RELRO function as mitigation mechanisms, and explore bypass techniques using hook overwriting and One Gadget exploitation.
Objectives

Topics Covered

  • Memory address randomization using PIE (Position-Independent Executable)
  • ELF binary protection with RELRO (Relocation Read-Only)
  • Understanding and practicing hooking and hook overwrite techniques
  • Gaining a shell using One Gadget exploitation

Recommended For

  • Those interested in system security
  • Learners who want to understand vulnerabilities and bypass techniques

Prerequisite Knowledge

  • Basic understanding of programming and system concepts
  • Foundational knowledge of memory management and security techniques

Environment

  • Linux environment based on x86-64 architecture (Ubuntu 22.04)
Composition
PIE
Background: PIE
Quiz: PIE
RELRO
Background: RELRO
Quiz: RELRO
[Exercise] Hook Overwrite
Exploit Tech: Hook Overwrite
fho
[Exercise] Hook Overwrite - 2
Exercise: hook
Exercise: oneshot
oneshot
hook
Rating
9.9 (36)
0
All items must be completed before leaving a rating feedback.
Bypassing PIE & RELRO
9.9
(36)
Tier 1 Medium
0% Completed Total 0 completed
Lecture 0 /5
Wargame 0 /3
3
Quiz 0 /2
2
You can access locked objectives by upgrading your plan or purchasing the units separately.