Table of Contents
Previous Section Next Section

Index

R

random photons, 176
read permission, 15
redirecting IP, 216
registers, 17
EAX register, 84
moving single byte from, 91, 96
and negative/non-negative EAX numbers, 100
pop and push instructions for, 105
use when making system calls, 88
zeroing out, 97, 98, 103, 104
EBP register, 19, 84
EBX register, 84, 88, 91
ECX register, 84, 88, 91
EDI register, 84
EDX register, 84, 88, 91-92, 100
EIP register, 84, 92
ESI register, 84
ESP register, 19, 84, 105
processor registers, 84
relatively prime, 180
return address., 19-20
return command, 165
returning into libc technique, 129
return-into-libc call, 135-36
Return Material Authorization (RMA), 143
Rieck, Konrad, 192
Rigaux, Pascal, 231
RMA (Return Material Authorization), 143
routers, 141
RSA Data Security, 174, 180
RSA key, 184, 188
RST flag, 144
RST hijacking, 157
RST packets, 157, 158, 163, 164, 166
runtime, algorithmic, 177-78

Table of Contents
Previous Section Next Section