Linux Weaknesses Making It Easier To Get Exploited

Today we will discuss four weaknesses in current Linux and PaX ASLR design and implementation.

1) Too low entropy.
2) Non-uniform distribution.
3) Correlation between objects.
4) Inheritance.

The new technique for exploiting the correlation and weakness is presented, which can bypass full ASLR Linux in 64-bit architecture system in less then a second. A deep analysis of these weaknesses enabled to propose new ASLR design, a concept named as ASLR-NG. This will overcome all the current ASLR’s weaknesses including PaX solution.  Finally presents ASLRA, a tool to analyze the ASLR entropy of Linux.


Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

OSINT Tutorial to Discover Antivirus of the Target

This OSINT tutorial demonstrates the "RECON-NG tool" on Kali Linux. It discovers the type of Anti-Virus software (AV) the victim is running on their...

Cracking Password Protected ZIP, RAR & PDF using Zydra

Having confidential documents on a system, like a pdf of financial data or a zip including personal images and videos, ensure they're password-protected so...

Four Ways SASE is Revolutionizing Network Security 

Are you interested in a network that offers amazing security features without compromising high-speed performance? With SASE, you don't have to settle for less....

Protect Your Account From Being Hacked While Online Banking on a Public Network

An online account is an account that you register to access or use a website or application. Indeed you have an online account such...