From Wikipedia, the free encyclopedia



Users

Additions

  1. 2016-06-22 13:40:23 (UTC): User Dqkk t • c • dc • l • ef • b • bl; (45) to Sigreturn-oriented programming ( | talk | history | links | watch | logs) ( diff  !top) - Link: 0x36.blogspot.it/2014/06/sigreturn-rop-exploitation-technique.html ( R/ Xmeta/ L)
    Other links: 0x36.blogspot.it/2014/06/sigreturn-rop-exploitation-technique.html (45, 4, 1, 1- R/ X/ L)
  2. 2020-07-16 11:14:41 (UTC): w:fa:User:Moghaddas.mohammadreza ( t - c; 113) to w:fa:حمله‌های مبتنی بر Sigreturn-مبنا ( diff - DELETED) - Link: 0x36.blogspot.it/2014/06/sigreturn-rop-exploitation-technique.html ( R/ Xmeta/ L)
    Other links: 0x36.blogspot.it/2014/06/sigreturn-rop-exploitation-technique.html (113, 4, 3, 1- R/ X/ L) zer0day.tistory.com/275 (113, 4, 3, 1- R/ X/ L) docs.binjit.su/rop/srop.html (113, 4, 3, 1- R/ X/ L) v0ids3curity.blogspot.it/2015/06/fun-with-srop-exploitation.html (113, 4, 3, 1- R/ X/ L) x86overflow.blogspot.it/2014/04/playing-around-with-srop.html (113, 4, 3, 1- R/ X/ L) labs.portcullis.co.uk/blog/ohm-2013-review-of-returning-signals-for-fun-and-profit/ (113, 8, 3, 1- R/ X/ L) software.intel.com/sites/default/files/managed/4d/2a/control-flow-enforcement-technology-preview.pdf (113, -1, X, X- R/ X/ L) www.theregister.co.uk/2016/06/10/intel_control_flow_enforcement/ (113, -1, X, X- R/ X/ L) pax.grsecurity.net/docs/PaXTeam-H2HC15-RAP-RIP-ROP.pdf (113, 62, 5, 1- R/ X/ L) www.cyberciti.biz/tips/selinux-vs-apparmor-vs-grsecurity.html (113, 128, 5, 1- R/ X/ L) toh.necst.it/hack.lu/2015/exploitable/StackStuff/#why-and-how-does-vsyscall-emulation-work (113, 7, 5, 1- R/ X/ L) lwn.net/Articles/446528/ (113, 5557, X, X- R/ X/ L) lwn.net/Articles/674861/ (113, 5557, X, X- R/ X/ L) hmarco.org/bugs/CVE-2016-3672-Unlimiting-the-stack-not-longer-disables-ASLR.html (113, 10, 5, 1- R/ X/ L) thisissecurity.net/2015/01/03/playing-with-signals-an-overview-on-sigreturn-oriented-programming/ (113, 9, 6, 1- R/ X/ L) lwn.net/Articles/676803/ (113, 5557, X, X- R/ X/ L) man7.org/linux/man-pages/man2/sigreturn.2.html (113, 835, 14, 0- R/ X/ L) man7.org/linux/man-pages/man2/sigreturn.2.html (113, 835, 14, 0- R/ X/ L) lxr.free-electrons.com/source/arch/x86/include/uapi/asm/sigcontext.h (113, 48, 7, 1- R/ X/ L) www.ieee-security.org/TC/SP2014/oakland2014-best-papers.html (113, 177, 7, 1- R/ X/ L) doi.org/10.1109%2FSP.2014.23 (113, -1, X, X- R/ X/ L) www.cs.vu.nl/~herbertb/papers/srop_sp14.pdf (113, 262, 7, 0- R/ X/ L)
  3. 2020-07-16 11:19:35 (UTC): w:fa:User:Moghaddas.mohammadreza ( t - c; 113) to w:fa:حمله‌های مبتنی بر برنامه‌نویسی Sigreturn-مبنا ( diff  !top) - Link: 0x36.blogspot.it/2014/06/sigreturn-rop-exploitation-technique.html ( R/ Xmeta/ L- still there)
    Other links: 0x36.blogspot.it/2014/06/sigreturn-rop-exploitation-technique.html (113, 4, 3, 1- R/ X/ L) zer0day.tistory.com/275 (113, 4, 3, 1- R/ X/ L) docs.binjit.su/rop/srop.html (113, 4, 3, 1- R/ X/ L) v0ids3curity.blogspot.it/2015/06/fun-with-srop-exploitation.html (113, 4, 3, 1- R/ X/ L) x86overflow.blogspot.it/2014/04/playing-around-with-srop.html (113, 4, 3, 1- R/ X/ L) labs.portcullis.co.uk/blog/ohm-2013-review-of-returning-signals-for-fun-and-profit/ (113, 8, 3, 1- R/ X/ L) software.intel.com/sites/default/files/managed/4d/2a/control-flow-enforcement-technology-preview.pdf (113, -1, X, X- R/ X/ L) www.theregister.co.uk/2016/06/10/intel_control_flow_enforcement/ (113, -1, X, X- R/ X/ L) pax.grsecurity.net/docs/PaXTeam-H2HC15-RAP-RIP-ROP.pdf (113, 62, 5, 1- R/ X/ L) www.cyberciti.biz/tips/selinux-vs-apparmor-vs-grsecurity.html (113, 128, 5, 1- R/ X/ L) toh.necst.it/hack.lu/2015/exploitable/StackStuff/#why-and-how-does-vsyscall-emulation-work (113, 7, 5, 1- R/ X/ L) lwn.net/Articles/446528/ (113, 5557, X, X- R/ X/ L) lwn.net/Articles/674861/ (113, 5557, X, X- R/ X/ L) hmarco.org/bugs/CVE-2016-3672-Unlimiting-the-stack-not-longer-disables-ASLR.html (113, 10, 5, 1- R/ X/ L) thisissecurity.net/2015/01/03/playing-with-signals-an-overview-on-sigreturn-oriented-programming/ (113, 9, 6, 1- R/ X/ L) lwn.net/Articles/676803/ (113, 5557, X, X- R/ X/ L) man7.org/linux/man-pages/man2/sigreturn.2.html (113, 835, 14, 0- R/ X/ L) man7.org/linux/man-pages/man2/sigreturn.2.html (113, 835, 14, 0- R/ X/ L) lxr.free-electrons.com/source/arch/x86/include/uapi/asm/sigcontext.h (113, 48, 7, 1- R/ X/ L) www.ieee-security.org/TC/SP2014/oakland2014-best-papers.html (113, 177, 7, 1- R/ X/ L) doi.org/10.1109%2FSP.2014.23 (113, -1, X, X- R/ X/ L) www.cs.vu.nl/~herbertb/papers/srop_sp14.pdf (113, 262, 7, 0- R/ X/ L)
  4. 2020-07-21 07:09:56 (UTC): w:fa:User:Moghaddas.mohammadreza ( t - c; 113) to w:fa:حمله‌های مبتنی بر سواستفاده از تابع بازگشت از سیگنال ( diff  top) - Link: 0x36.blogspot.it/2014/06/sigreturn-rop-exploitation-technique.html ( R/ Xmeta/ L- still there)
    Other links: 0x36.blogspot.it/2014/06/sigreturn-rop-exploitation-technique.html (113, 4, 3, 1- R/ X/ L) zer0day.tistory.com/275 (113, 4, 3, 1- R/ X/ L) docs.binjit.su/rop/srop.html (113, 4, 3, 1- R/ X/ L) v0ids3curity.blogspot.it/2015/06/fun-with-srop-exploitation.html (113, 4, 3, 1- R/ X/ L) x86overflow.blogspot.it/2014/04/playing-around-with-srop.html (113, 4, 3, 1- R/ X/ L) labs.portcullis.co.uk/blog/ohm-2013-review-of-returning-signals-for-fun-and-profit/ (113, 8, 3, 1- R/ X/ L) software.intel.com/sites/default/files/managed/4d/2a/control-flow-enforcement-technology-preview.pdf (113, -1, X, X- R/ X/ L) www.theregister.co.uk/2016/06/10/intel_control_flow_enforcement/ (113, -1, X, X- R/ X/ L) pax.grsecurity.net/docs/PaXTeam-H2HC15-RAP-RIP-ROP.pdf (113, 62, 5, 1- R/ X/ L) www.cyberciti.biz/tips/selinux-vs-apparmor-vs-grsecurity.html (113, 128, 5, 1- R/ X/ L) toh.necst.it/hack.lu/2015/exploitable/StackStuff/#why-and-how-does-vsyscall-emulation-work (113, 7, 5, 1- R/ X/ L) lwn.net/Articles/446528/ (113, 5557, X, X- R/ X/ L) lwn.net/Articles/674861/ (113, 5557, X, X- R/ X/ L) hmarco.org/bugs/CVE-2016-3672-Unlimiting-the-stack-not-longer-disables-ASLR.html (113, 10, 5, 1- R/ X/ L) thisissecurity.net/2015/01/03/playing-with-signals-an-overview-on-sigreturn-oriented-programming/ (113, 9, 6, 1- R/ X/ L) lwn.net/Articles/676803/ (113, 5557, X, X- R/ X/ L) man7.org/linux/man-pages/man2/sigreturn.2.html (113, 835, 14, 0- R/ X/ L) man7.org/linux/man-pages/man2/sigreturn.2.html (113, 835, 14, 0- R/ X/ L) lxr.free-electrons.com/source/arch/x86/include/uapi/asm/sigcontext.h (113, 48, 7, 1- R/ X/ L) www.ieee-security.org/TC/SP2014/oakland2014-best-papers.html (113, 177, 7, 1- R/ X/ L) doi.org/10.1109%2FSP.2014.23 (113, -1, X, X- R/ X/ L) www.cs.vu.nl/~herbertb/papers/srop_sp14.pdf (113, 262, 7, 0- R/ X/ L)
  • Displayed all 4 additions.
From Wikipedia, the free encyclopedia



Users

Additions

  1. 2016-06-22 13:40:23 (UTC): User Dqkk t • c • dc • l • ef • b • bl; (45) to Sigreturn-oriented programming ( | talk | history | links | watch | logs) ( diff  !top) - Link: 0x36.blogspot.it/2014/06/sigreturn-rop-exploitation-technique.html ( R/ Xmeta/ L)
    Other links: 0x36.blogspot.it/2014/06/sigreturn-rop-exploitation-technique.html (45, 4, 1, 1- R/ X/ L)
  2. 2020-07-16 11:14:41 (UTC): w:fa:User:Moghaddas.mohammadreza ( t - c; 113) to w:fa:حمله‌های مبتنی بر Sigreturn-مبنا ( diff - DELETED) - Link: 0x36.blogspot.it/2014/06/sigreturn-rop-exploitation-technique.html ( R/ Xmeta/ L)
    Other links: 0x36.blogspot.it/2014/06/sigreturn-rop-exploitation-technique.html (113, 4, 3, 1- R/ X/ L) zer0day.tistory.com/275 (113, 4, 3, 1- R/ X/ L) docs.binjit.su/rop/srop.html (113, 4, 3, 1- R/ X/ L) v0ids3curity.blogspot.it/2015/06/fun-with-srop-exploitation.html (113, 4, 3, 1- R/ X/ L) x86overflow.blogspot.it/2014/04/playing-around-with-srop.html (113, 4, 3, 1- R/ X/ L) labs.portcullis.co.uk/blog/ohm-2013-review-of-returning-signals-for-fun-and-profit/ (113, 8, 3, 1- R/ X/ L) software.intel.com/sites/default/files/managed/4d/2a/control-flow-enforcement-technology-preview.pdf (113, -1, X, X- R/ X/ L) www.theregister.co.uk/2016/06/10/intel_control_flow_enforcement/ (113, -1, X, X- R/ X/ L) pax.grsecurity.net/docs/PaXTeam-H2HC15-RAP-RIP-ROP.pdf (113, 62, 5, 1- R/ X/ L) www.cyberciti.biz/tips/selinux-vs-apparmor-vs-grsecurity.html (113, 128, 5, 1- R/ X/ L) toh.necst.it/hack.lu/2015/exploitable/StackStuff/#why-and-how-does-vsyscall-emulation-work (113, 7, 5, 1- R/ X/ L) lwn.net/Articles/446528/ (113, 5557, X, X- R/ X/ L) lwn.net/Articles/674861/ (113, 5557, X, X- R/ X/ L) hmarco.org/bugs/CVE-2016-3672-Unlimiting-the-stack-not-longer-disables-ASLR.html (113, 10, 5, 1- R/ X/ L) thisissecurity.net/2015/01/03/playing-with-signals-an-overview-on-sigreturn-oriented-programming/ (113, 9, 6, 1- R/ X/ L) lwn.net/Articles/676803/ (113, 5557, X, X- R/ X/ L) man7.org/linux/man-pages/man2/sigreturn.2.html (113, 835, 14, 0- R/ X/ L) man7.org/linux/man-pages/man2/sigreturn.2.html (113, 835, 14, 0- R/ X/ L) lxr.free-electrons.com/source/arch/x86/include/uapi/asm/sigcontext.h (113, 48, 7, 1- R/ X/ L) www.ieee-security.org/TC/SP2014/oakland2014-best-papers.html (113, 177, 7, 1- R/ X/ L) doi.org/10.1109%2FSP.2014.23 (113, -1, X, X- R/ X/ L) www.cs.vu.nl/~herbertb/papers/srop_sp14.pdf (113, 262, 7, 0- R/ X/ L)
  3. 2020-07-16 11:19:35 (UTC): w:fa:User:Moghaddas.mohammadreza ( t - c; 113) to w:fa:حمله‌های مبتنی بر برنامه‌نویسی Sigreturn-مبنا ( diff  !top) - Link: 0x36.blogspot.it/2014/06/sigreturn-rop-exploitation-technique.html ( R/ Xmeta/ L- still there)
    Other links: 0x36.blogspot.it/2014/06/sigreturn-rop-exploitation-technique.html (113, 4, 3, 1- R/ X/ L) zer0day.tistory.com/275 (113, 4, 3, 1- R/ X/ L) docs.binjit.su/rop/srop.html (113, 4, 3, 1- R/ X/ L) v0ids3curity.blogspot.it/2015/06/fun-with-srop-exploitation.html (113, 4, 3, 1- R/ X/ L) x86overflow.blogspot.it/2014/04/playing-around-with-srop.html (113, 4, 3, 1- R/ X/ L) labs.portcullis.co.uk/blog/ohm-2013-review-of-returning-signals-for-fun-and-profit/ (113, 8, 3, 1- R/ X/ L) software.intel.com/sites/default/files/managed/4d/2a/control-flow-enforcement-technology-preview.pdf (113, -1, X, X- R/ X/ L) www.theregister.co.uk/2016/06/10/intel_control_flow_enforcement/ (113, -1, X, X- R/ X/ L) pax.grsecurity.net/docs/PaXTeam-H2HC15-RAP-RIP-ROP.pdf (113, 62, 5, 1- R/ X/ L) www.cyberciti.biz/tips/selinux-vs-apparmor-vs-grsecurity.html (113, 128, 5, 1- R/ X/ L) toh.necst.it/hack.lu/2015/exploitable/StackStuff/#why-and-how-does-vsyscall-emulation-work (113, 7, 5, 1- R/ X/ L) lwn.net/Articles/446528/ (113, 5557, X, X- R/ X/ L) lwn.net/Articles/674861/ (113, 5557, X, X- R/ X/ L) hmarco.org/bugs/CVE-2016-3672-Unlimiting-the-stack-not-longer-disables-ASLR.html (113, 10, 5, 1- R/ X/ L) thisissecurity.net/2015/01/03/playing-with-signals-an-overview-on-sigreturn-oriented-programming/ (113, 9, 6, 1- R/ X/ L) lwn.net/Articles/676803/ (113, 5557, X, X- R/ X/ L) man7.org/linux/man-pages/man2/sigreturn.2.html (113, 835, 14, 0- R/ X/ L) man7.org/linux/man-pages/man2/sigreturn.2.html (113, 835, 14, 0- R/ X/ L) lxr.free-electrons.com/source/arch/x86/include/uapi/asm/sigcontext.h (113, 48, 7, 1- R/ X/ L) www.ieee-security.org/TC/SP2014/oakland2014-best-papers.html (113, 177, 7, 1- R/ X/ L) doi.org/10.1109%2FSP.2014.23 (113, -1, X, X- R/ X/ L) www.cs.vu.nl/~herbertb/papers/srop_sp14.pdf (113, 262, 7, 0- R/ X/ L)
  4. 2020-07-21 07:09:56 (UTC): w:fa:User:Moghaddas.mohammadreza ( t - c; 113) to w:fa:حمله‌های مبتنی بر سواستفاده از تابع بازگشت از سیگنال ( diff  top) - Link: 0x36.blogspot.it/2014/06/sigreturn-rop-exploitation-technique.html ( R/ Xmeta/ L- still there)
    Other links: 0x36.blogspot.it/2014/06/sigreturn-rop-exploitation-technique.html (113, 4, 3, 1- R/ X/ L) zer0day.tistory.com/275 (113, 4, 3, 1- R/ X/ L) docs.binjit.su/rop/srop.html (113, 4, 3, 1- R/ X/ L) v0ids3curity.blogspot.it/2015/06/fun-with-srop-exploitation.html (113, 4, 3, 1- R/ X/ L) x86overflow.blogspot.it/2014/04/playing-around-with-srop.html (113, 4, 3, 1- R/ X/ L) labs.portcullis.co.uk/blog/ohm-2013-review-of-returning-signals-for-fun-and-profit/ (113, 8, 3, 1- R/ X/ L) software.intel.com/sites/default/files/managed/4d/2a/control-flow-enforcement-technology-preview.pdf (113, -1, X, X- R/ X/ L) www.theregister.co.uk/2016/06/10/intel_control_flow_enforcement/ (113, -1, X, X- R/ X/ L) pax.grsecurity.net/docs/PaXTeam-H2HC15-RAP-RIP-ROP.pdf (113, 62, 5, 1- R/ X/ L) www.cyberciti.biz/tips/selinux-vs-apparmor-vs-grsecurity.html (113, 128, 5, 1- R/ X/ L) toh.necst.it/hack.lu/2015/exploitable/StackStuff/#why-and-how-does-vsyscall-emulation-work (113, 7, 5, 1- R/ X/ L) lwn.net/Articles/446528/ (113, 5557, X, X- R/ X/ L) lwn.net/Articles/674861/ (113, 5557, X, X- R/ X/ L) hmarco.org/bugs/CVE-2016-3672-Unlimiting-the-stack-not-longer-disables-ASLR.html (113, 10, 5, 1- R/ X/ L) thisissecurity.net/2015/01/03/playing-with-signals-an-overview-on-sigreturn-oriented-programming/ (113, 9, 6, 1- R/ X/ L) lwn.net/Articles/676803/ (113, 5557, X, X- R/ X/ L) man7.org/linux/man-pages/man2/sigreturn.2.html (113, 835, 14, 0- R/ X/ L) man7.org/linux/man-pages/man2/sigreturn.2.html (113, 835, 14, 0- R/ X/ L) lxr.free-electrons.com/source/arch/x86/include/uapi/asm/sigcontext.h (113, 48, 7, 1- R/ X/ L) www.ieee-security.org/TC/SP2014/oakland2014-best-papers.html (113, 177, 7, 1- R/ X/ L) doi.org/10.1109%2FSP.2014.23 (113, -1, X, X- R/ X/ L) www.cs.vu.nl/~herbertb/papers/srop_sp14.pdf (113, 262, 7, 0- R/ X/ L)
  • Displayed all 4 additions.

Videos

Youtube | Vimeo | Bing

Websites

Google | Yahoo | Bing

Encyclopedia

Google | Yahoo | Bing

Facebook