Table of Contents
Previous Section Next Section

Index

E

EAX register, 84
moving single byte from, 91, 96
and negative/non-negative EAX numbers, 100
pop and push instructions for, 105
use when making system calls, 88
zeroing out, 97, 98, 103, 104
EBP (extended base pointer), 17, 84
EBP register, 19, 84
EBX register, 84, 88, 91
Echo Reply messages, 142
ECX register, 84, 88, 91
EDI register, 84
EDX register, 84, 88, 91-92, 100
effective user ID (euid), 15
EIP (extended instruction pointer), 17, 84, 92
EIP register, 84, 92
elegance, 8
ELF binary, 89
ELF (Executable and Linking Format) binary, 89
encapsulation, 141
encryption
asymmetric, 180-85
symmetric, 178-80
wireless 802.11b, 211-14
encryption-breaking algorithm, 176
environment, 11, 31-40
env_exploit.c code, 32-38
getenvaddr.c code, 38-41
vuln2.c code, 31-32
ESI register, 84
ESP (extended stack pointer), 17, 84
ESP register, 19, 84, 105
Ethernet, and data-link layer, 145
Ethernet headers, 145, 150
Ethernet packets, 145, 146
Euclidian algorithm, 181-84
euid (effective user ID), 15
execl( ) function, 31-32, 134
Executable and Linking Format (ELF) binary, 89
execute permission, 15
execution of arbitrary code, 15
execve( ) function, 90, 91, 97, 99
exit( ) function, 87, 88, 129
exploitation of programs, 11-15
exploit techniques, 14-15
without exploit code, 27-31
exploit.c code, 26-27
export VARNAME=value, 33
extended base pointer. See EBP (extended base pointer)
extended Euclidean algorithm, 181-84
extended instruction pointer. See EIP (extended instruction pointer)
extended stack pointer. See ESP (extended stack pointer)

Table of Contents
Previous Section Next Section