PDA

View Full Version : Hacker Bypasses Windows 7/8 Address Space Layout Randomization



wraggster
January 25th, 2013, 23:17
Microsoft upped its security ante with Address Space Layout Randomization (ASLR) in Windows 7 and Windows 8, but it seems this mechanism to prevent hackers from jumping to a known memory location can be bypassed. A hacker has released a brilliant, yet simple trick to circumvent this protection (http://kingcope.wordpress.com/2013/01/24/attacking-the-windows-78-address-space-randomization/). KingCope, a hacker who released several exploits (http://news.slashdot.org/story/12/12/03/1432222/researcher-discloses-new-batch-of-mysql-vulnerabilities) targeting MySQL in December, has detailed a mechanism through which the ASLR of Windows 7, Windows 8 and probably other operating systems can bebypassed to load a DLL file (http://paritynews.com/security/item/581-hacker-bypasses-windows-7-8-address-space-layout-randomization) with malicious instructions to a known address space.
http://tech.slashdot.org/story/13/01/25/2146222/hacker-bypasses-windows-78-address-space-layout-randomization