Overview
Explore the intricacies of buffer overflow exploitation on the RISC-V architecture in this 36-minute conference talk. Gain an introduction to RISC-V and understand how exploitation techniques differ from Intel and ARM platforms. Learn to overflow buffers, create shellcode in assembly language, and perform ret2libc attacks. Delve into important registers, local variables, and hacking approaches specific to RISC-V. Discover techniques for manipulating buffer sizes, utilizing odd numbers, and leveraging writable stacks. Examine practical examples of overwriting buffers, fixing stacks, and analyzing object dumps. Suitable for those with a basic understanding of assembly and C programming.
Syllabus
Introduction
Agenda
License Fees
Architecture
Important registers
Local variables
Hacking
Buffer Overflow
Approach
Shell Code
Buffer Size
Snail bites
Using odd numbers
Using larger numbers
Writable stack
Shellcode
Overwrite Buffer
Program nominee
Object dump
Fill the buffer
Fix the stack
Questions
Userspace
Outro
Taught by
Linux Foundation