• 0

Blind Return Oriented Programming (BROP)  scs.stanford.edu

2016-03-20 02:53:43 in Whitepapers and Videos by Red Letter Security

"The BROP attack makes it possible to write exploits without possessing the target's binary. It requires a stack overflow and a service that restarts after a crash. Based on whether a service crashes or not (i.e., connection closes or stays open), the BROP attack is able to construct a full remote exploit that leads to a shell. The BROP attack remotely leaks enough gadgets to perform the write system call, after which the binary is transferred from memory to the attacker's socket."