EXPLOITING EMBEDDED SYSTEMS THE SEQUEL!
Exploitation - CanSecWest
Exploitation - CanSecWest
- No tags were found...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Exploitation• Embedded stack overflows are reliable – few firmware revisions• Overwrite $pc, redirect to attacker code -- standard fare!• Can be very reliable on ARM as $pc can be operated on directly• Examples: redirect $pc to:ARM:MIPS:mov $pc, j Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 30