检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:刘丹 LIU Dan(Department of Digital Arts,Suzhou Industrial Park Branch,Jiangsu Union Technical Institute,Suzhou 215123,China)
机构地区:[1]江苏联合职业技术学院苏州工业园区分院数字艺术系,江苏苏州215123
出 处:《成都工业学院学报》2022年第1期19-24,共6页Journal of Chengdu Technological University
摘 要:缓冲区溢出漏洞攻击是通过修改SEH链表中内容,改变原代码的执行流程,转而执行恶意代码来实现的。以文件分享系统软件为例,介绍了SEH漏洞挖掘过程、分析了漏洞产生原因、漏洞利用原理。具体阐述了基于Python语言的SEH漏洞渗透模块开发步骤,最终实现了利用SEH漏洞远程控制客户端,为基于Python的SEH漏洞渗透开发提供了通用的代码模板。The buffer overflow vulnerability attack is realized by modifying the content in the SEH linked list,changing the execution flow of the original code,and executing malicious code instead.Taking the file sharing system software as an example,the SEH vulnerability mining process was introduced,the cause of the vulnerability and the principle of vulnerability utilization was analyzed,The development steps of SEH vulnerability penetration module based on Python language were described in detail,and finally the remote control client using SEH vulnerability was realized,which provides a general code template for SEH vulnerability penetration development based on Python,and has strong practical value.
关 键 词:结构化异常处理 SafeSEH PYTHON METASPLOIT 漏洞渗透
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.68