#aslr — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #aslr, aggregated by home.social.
-
#gVisor recently got its own #ASLR implementation. OTOH, #Sydbox uses ASLR provided by the #Linux #kernel and enforces PIE executables. #HardenedBSD has a sysctl to enforce PIE as well: https://man.exherbo.org/syd.7.html#Enforcing_Position-Independent_Executables_(PIE) #exherbo #linux #security
-
#gVisor recently got its own #ASLR implementation. OTOH, #Sydbox uses ASLR provided by the #Linux #kernel and enforces PIE executables. #HardenedBSD has a sysctl to enforce PIE as well: https://man.exherbo.org/syd.7.html#Enforcing_Position-Independent_Executables_(PIE) #exherbo #linux #security
-
#gVisor recently got its own #ASLR implementation. OTOH, #Sydbox uses ASLR provided by the #Linux #kernel and enforces PIE executables. #HardenedBSD has a sysctl to enforce PIE as well: https://man.exherbo.org/syd.7.html#Enforcing_Position-Independent_Executables_(PIE) #exherbo #linux #security
-
#gVisor recently got its own #ASLR implementation. OTOH, #Sydbox uses ASLR provided by the #Linux #kernel and enforces PIE executables. #HardenedBSD has a sysctl to enforce PIE as well: https://man.exherbo.org/syd.7.html#Enforcing_Position-Independent_Executables_(PIE) #exherbo #linux #security
-
#gVisor recently got its own #ASLR implementation. OTOH, #Sydbox uses ASLR provided by the #Linux #kernel and enforces PIE executables. #HardenedBSD has a sysctl to enforce PIE as well: https://man.exherbo.org/syd.7.html#Enforcing_Position-Independent_Executables_(PIE) #exherbo #linux #security
-
No Leak, No Problem - Bypassing ASLR with a ROP Chain to Gain RCE;
-
No Leak, No Problem - Bypassing ASLR with a ROP Chain to Gain RCE;
-
No Leak, No Problem - Bypassing ASLR with a ROP Chain to Gain RCE;
-
No Leak, No Problem - Bypassing ASLR with a ROP Chain to Gain RCE;
-
No Leak, No Problem - Bypassing ASLR with a ROP Chain to Gain RCE;
-
Как системщику остаться в живых: харденинг, который не убьет ваш перфоманс
Здравствуйте, меня зовут Анна Мелехова. Я старший архитектор в отделе развития архитектуры KasperskyOS. В статье я хочу поделиться практическим опытом системной разработки, которой я занималась сначала в проекте по виртуализации, а теперь в «Лаборатории Касперского», где мы делаем микроядерную операционную систему с повышенными требованиями к безопасности – KasperskyOS . Когда вы работаете в такой среде, быстро понимаете: харденинг – это не красивые галочки в чек-листе, а набор очень конкретных, очень практических решений, которые должны и защищать, и минимально снижать производительность. О них я и расскажу, а в конце дам личный топ самых полезных харденингов, которые бустят security и не снижают performance.
https://habr.com/ru/companies/kaspersky/articles/968388/
#kasperskyos #системное_программирование #харденинг #canary #aslr #cfi
-
Как системщику остаться в живых: харденинг, который не убьет ваш перфоманс
Здравствуйте, меня зовут Анна Мелехова. Я старший архитектор в отделе развития архитектуры KasperskyOS. В статье я хочу поделиться практическим опытом системной разработки, которой я занималась сначала в проекте по виртуализации, а теперь в «Лаборатории Касперского», где мы делаем микроядерную операционную систему с повышенными требованиями к безопасности – KasperskyOS . Когда вы работаете в такой среде, быстро понимаете: харденинг – это не красивые галочки в чек-листе, а набор очень конкретных, очень практических решений, которые должны и защищать, и минимально снижать производительность. О них я и расскажу, а в конце дам личный топ самых полезных харденингов, которые бустят security и не снижают performance.
https://habr.com/ru/companies/kaspersky/articles/968388/
#kasperskyos #системное_программирование #харденинг #canary #aslr #cfi
-
Как системщику остаться в живых: харденинг, который не убьет ваш перфоманс
Здравствуйте, меня зовут Анна Мелехова. Я старший архитектор в отделе развития архитектуры KasperskyOS. В статье я хочу поделиться практическим опытом системной разработки, которой я занималась сначала в проекте по виртуализации, а теперь в «Лаборатории Касперского», где мы делаем микроядерную операционную систему с повышенными требованиями к безопасности – KasperskyOS . Когда вы работаете в такой среде, быстро понимаете: харденинг – это не красивые галочки в чек-листе, а набор очень конкретных, очень практических решений, которые должны и защищать, и минимально снижать производительность. О них я и расскажу, а в конце дам личный топ самых полезных харденингов, которые бустят security и не снижают performance.
https://habr.com/ru/companies/kaspersky/articles/968388/
#kasperskyos #системное_программирование #харденинг #canary #aslr #cfi
-
Как системщику остаться в живых: харденинг, который не убьет ваш перфоманс
Здравствуйте, меня зовут Анна Мелехова. Я старший архитектор в отделе развития архитектуры KasperskyOS. В статье я хочу поделиться практическим опытом системной разработки, которой я занималась сначала в проекте по виртуализации, а теперь в «Лаборатории Касперского», где мы делаем микроядерную операционную систему с повышенными требованиями к безопасности – KasperskyOS . Когда вы работаете в такой среде, быстро понимаете: харденинг – это не красивые галочки в чек-листе, а набор очень конкретных, очень практических решений, которые должны и защищать, и минимально снижать производительность. О них я и расскажу, а в конце дам личный топ самых полезных харденингов, которые бустят security и не снижают performance.
https://habr.com/ru/companies/kaspersky/articles/968388/
#kasperskyos #системное_программирование #харденинг #canary #aslr #cfi
-
💻🔓 "Because who needs security when you have a fancy ROP chain to unravel ASLR? Watch in awe as we pretend it's 2005 and marvel at #hacking the unhackable! 🎩✨"
https://modzero.com/en/blog/no-leak-no-problem/ #reverseengineering #ASLR #ROPchain #cybersecurity #HackerNews #ngated -
💻🔓 "Because who needs security when you have a fancy ROP chain to unravel ASLR? Watch in awe as we pretend it's 2005 and marvel at #hacking the unhackable! 🎩✨"
https://modzero.com/en/blog/no-leak-no-problem/ #reverseengineering #ASLR #ROPchain #cybersecurity #HackerNews #ngated -
💻🔓 "Because who needs security when you have a fancy ROP chain to unravel ASLR? Watch in awe as we pretend it's 2005 and marvel at #hacking the unhackable! 🎩✨"
https://modzero.com/en/blog/no-leak-no-problem/ #reverseengineering #ASLR #ROPchain #cybersecurity #HackerNews #ngated -
💻🔓 "Because who needs security when you have a fancy ROP chain to unravel ASLR? Watch in awe as we pretend it's 2005 and marvel at #hacking the unhackable! 🎩✨"
https://modzero.com/en/blog/no-leak-no-problem/ #reverseengineering #ASLR #ROPchain #cybersecurity #HackerNews #ngated -
No Leak, No Problem – Bypassing ASLR with a ROP Chain to Gain RCE
https://modzero.com/en/blog/no-leak-no-problem/
#HackerNews #NoLeakNoProblem #ROPChain #RCE #SecurityResearch #ASLR #Exploit
-
No Leak, No Problem – Bypassing ASLR with a ROP Chain to Gain RCE
https://modzero.com/en/blog/no-leak-no-problem/
#HackerNews #NoLeakNoProblem #ROPChain #RCE #SecurityResearch #ASLR #Exploit
-
No Leak, No Problem – Bypassing ASLR with a ROP Chain to Gain RCE
https://modzero.com/en/blog/no-leak-no-problem/
#HackerNews #NoLeakNoProblem #ROPChain #RCE #SecurityResearch #ASLR #Exploit
-
No Leak, No Problem – Bypassing ASLR with a ROP Chain to Gain RCE
https://modzero.com/en/blog/no-leak-no-problem/
#HackerNews #NoLeakNoProblem #ROPChain #RCE #SecurityResearch #ASLR #Exploit
-
No Leak, No Problem – Bypassing ASLR with a ROP Chain to Gain RCE
https://modzero.com/en/blog/no-leak-no-problem/
#HackerNews #NoLeakNoProblem #ROPChain #RCE #SecurityResearch #ASLR #Exploit
-
#ASLR used to be "A Single Leak Required", now it's even better, nothing is required! #linux #security https://googleprojectzero.blogspot.com/2025/11/defeating-kaslr-by-doing-nothing-at-all.html
-
#ASLR used to be "A Single Leak Required", now it's even better, nothing is required! #linux #security https://googleprojectzero.blogspot.com/2025/11/defeating-kaslr-by-doing-nothing-at-all.html
-
#ASLR used to be "A Single Leak Required", now it's even better, nothing is required! #linux #security https://googleprojectzero.blogspot.com/2025/11/defeating-kaslr-by-doing-nothing-at-all.html
-
#ASLR used to be "A Single Leak Required", now it's even better, nothing is required! #linux #security https://googleprojectzero.blogspot.com/2025/11/defeating-kaslr-by-doing-nothing-at-all.html
-
Every one appreciates a good #security pun, so let me educate you on #bufferoverrun.
Don't let your stack get whacked, otherwise you'll get thoroughly #hacked.
Don't be a rookie and use a good stack cookie, lest things get spooky.
To bring you security up to par, you best add some #ASLR#vulnerability #informationsecurity #infosec #programming #hacking #bufferbloat #stacksmashing
-
Every one appreciates a good #security pun, so let me educate you on #bufferoverrun.
Don't let your stack get whacked, otherwise you'll get thoroughly #hacked.
Don't be a rookie and use a good stack cookie, lest things get spooky.
To bring you security up to par, you best add some #ASLR#vulnerability #informationsecurity #infosec #programming #hacking #bufferbloat #stacksmashing
-
Every one appreciates a good #security pun, so let me educate you on #bufferoverrun.
Don't let your stack get whacked, otherwise you'll get thoroughly #hacked.
Don't be a rookie and use a good stack cookie, lest things get spooky.
To bring you security up to par, you best add some #ASLR#vulnerability #informationsecurity #infosec #programming #hacking #bufferbloat #stacksmashing
-
Every one appreciates a good #security pun, so let me educate you on #bufferoverrun.
Don't let your stack get whacked, otherwise you'll get thoroughly #hacked.
Don't be a rookie and use a good stack cookie, lest things get spooky.
To bring you security up to par, you best add some #ASLR#vulnerability #informationsecurity #infosec #programming #hacking #bufferbloat #stacksmashing
-
Every one appreciates a good #security pun, so let me educate you on #bufferoverrun.
Don't let your stack get whacked, otherwise you'll get thoroughly #hacked.
Don't be a rookie and use a good stack cookie, lest things get spooky.
To bring you security up to par, you best add some #ASLR#vulnerability #informationsecurity #infosec #programming #hacking #bufferbloat #stacksmashing
-
Google Project Zero Exposes ASLR Bypass Vulnerability in Apple’s Serialization Framework https://thecyberexpress.com/project-zero-exposes-aslr-bypass/ #AddressSpaceLayoutRandomization #TheCyberExpressNews #TheCyberExpress #ProjectZero #CyberNews #Apple #ASLR
-
Google Project Zero Exposes ASLR Bypass Vulnerability in Apple’s Serialization Framework https://thecyberexpress.com/project-zero-exposes-aslr-bypass/ #AddressSpaceLayoutRandomization #TheCyberExpressNews #TheCyberExpress #ProjectZero #CyberNews #Apple #ASLR
-
Google Project Zero Exposes ASLR Bypass Vulnerability in Apple’s Serialization Framework https://thecyberexpress.com/project-zero-exposes-aslr-bypass/ #AddressSpaceLayoutRandomization #TheCyberExpressNews #TheCyberExpress #ProjectZero #CyberNews #Apple #ASLR
-
Google Project Zero Exposes ASLR Bypass Vulnerability in Apple’s Serialization Framework https://thecyberexpress.com/project-zero-exposes-aslr-bypass/ #AddressSpaceLayoutRandomization #TheCyberExpressNews #TheCyberExpress #ProjectZero #CyberNews #Apple #ASLR
-
Did you know #gawk silently disables #ASLR behind your back if you enable the PMA option during build? Check with "gawk --version | head -n1 | grep PMA". This is done using the personality(2) syscall's ADDR_NO_RANDOMIZE flag which #sydbox denies by default so we noticed at #exherbo :-) https://www.gnu.org/software/gawk/manual/html_node/Persistent-Memory.html #linux #security
-
Did you know #gawk silently disables #ASLR behind your back if you enable the PMA option during build? Check with "gawk --version | head -n1 | grep PMA". This is done using the personality(2) syscall's ADDR_NO_RANDOMIZE flag which #sydbox denies by default so we noticed at #exherbo :-) https://www.gnu.org/software/gawk/manual/html_node/Persistent-Memory.html #linux #security
-
Did you know #gawk silently disables #ASLR behind your back if you enable the PMA option during build? Check with "gawk --version | head -n1 | grep PMA". This is done using the personality(2) syscall's ADDR_NO_RANDOMIZE flag which #sydbox denies by default so we noticed at #exherbo :-) https://www.gnu.org/software/gawk/manual/html_node/Persistent-Memory.html #linux #security
-
Did you know #gawk silently disables #ASLR behind your back if you enable the PMA option during build? Check with "gawk --version | head -n1 | grep PMA". This is done using the personality(2) syscall's ADDR_NO_RANDOMIZE flag which #sydbox denies by default so we noticed at #exherbo :-) https://www.gnu.org/software/gawk/manual/html_node/Persistent-Memory.html #linux #security
-
Address Space Layout Randomization: https://mohitmishra786.github.io/chessman/2024/09/29/Address-Space-Layout-Randomization.html
-
Address Space Layout Randomization: https://mohitmishra786.github.io/chessman/2024/09/29/Address-Space-Layout-Randomization.html
-
Address Space Layout Randomization: https://mohitmishra786.github.io/chessman/2024/09/29/Address-Space-Layout-Randomization.html
-
Toolchain Necromancy: Past Mistakes Haunting ASLR
“Starting from 2001 and continuing until 6 years ago with version 2.32, #binutils' ld linker set too large of an alignment on ELF binary sections. With a #Linux kernel >= 5.10 or glibc >= 2.35, binaries/libraries that were built with the older toolchain act as timebombs against #ASLR, making brute-force attacks easier on 64-bit binaries and reducing randomness to nothing in some cases for 32-bit binaries.”
https://grsecurity.net/toolchain_necromancy_past_mistakes_haunting_aslr
-
Toolchain Necromancy: Past Mistakes Haunting ASLR
“Starting from 2001 and continuing until 6 years ago with version 2.32, #binutils' ld linker set too large of an alignment on ELF binary sections. With a #Linux kernel >= 5.10 or glibc >= 2.35, binaries/libraries that were built with the older toolchain act as timebombs against #ASLR, making brute-force attacks easier on 64-bit binaries and reducing randomness to nothing in some cases for 32-bit binaries.”
https://grsecurity.net/toolchain_necromancy_past_mistakes_haunting_aslr
-
Toolchain Necromancy: Past Mistakes Haunting ASLR
“Starting from 2001 and continuing until 6 years ago with version 2.32, #binutils' ld linker set too large of an alignment on ELF binary sections. With a #Linux kernel >= 5.10 or glibc >= 2.35, binaries/libraries that were built with the older toolchain act as timebombs against #ASLR, making brute-force attacks easier on 64-bit binaries and reducing randomness to nothing in some cases for 32-bit binaries.”
https://grsecurity.net/toolchain_necromancy_past_mistakes_haunting_aslr
-
Toolchain Necromancy: Past Mistakes Haunting ASLR
“Starting from 2001 and continuing until 6 years ago with version 2.32, #binutils' ld linker set too large of an alignment on ELF binary sections. With a #Linux kernel >= 5.10 or glibc >= 2.35, binaries/libraries that were built with the older toolchain act as timebombs against #ASLR, making brute-force attacks easier on 64-bit binaries and reducing randomness to nothing in some cases for 32-bit binaries.”
https://grsecurity.net/toolchain_necromancy_past_mistakes_haunting_aslr
-
Toolchain Necromancy: Past Mistakes Haunting ASLR
“Starting from 2001 and continuing until 6 years ago with version 2.32, #binutils' ld linker set too large of an alignment on ELF binary sections. With a #Linux kernel >= 5.10 or glibc >= 2.35, binaries/libraries that were built with the older toolchain act as timebombs against #ASLR, making brute-force attacks easier on 64-bit binaries and reducing randomness to nothing in some cases for 32-bit binaries.”
https://grsecurity.net/toolchain_necromancy_past_mistakes_haunting_aslr
-
New PaXtest release after years of silence 🥳
Git source: https://github.com/opensrcsec/paxtest/
Small announcement: https://grsecurity.net/paxtest_release/ (worth a read, contains even more info than what’s written about 😛)
-
New PaXtest release after years of silence 🥳
Git source: https://github.com/opensrcsec/paxtest/
Small announcement: https://grsecurity.net/paxtest_release/ (worth a read, contains even more info than what’s written about 😛)