950, 1/48 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   rlaheehoon
   http://blog.naver.com/rlaheehoon
   BOF °ø°ÝÀÌ kernel ¹öÁ¯¿¡ µû¶ó µÉ¶§µµ ÀÖ°í ¾ÈµÉ¶§µµ ÀÖ³ª¿ä?

http://www.hackerschool.org/HS_Boards/zboard.php?AllArticle=true&no=566 [º¹»ç]


¸» ±×´ë·Î ÀÔ´Ï´Ù...
ftz.hackerschool.org¿¡¼­ Àß µÇ´ø °ÍµéÀÌ
Á¦ ÄÄÇ»ÅÍ ¸®´ª½º¿¡¼­ ¶È°°Àº ¼Ò½º·Î Ãë¾àÆÄÀÏ »ý¼ºÇؼ­ °ø°ÝÇϸé
¼¼±×¸àÅ×ÀÌ¼Ç ¿À·ù
stack smashing detected
µîµî °¢Á¾ ¿À·ù¸¦ ¶ç¿ì¸ç Á¾·áµÇ¾î ¹ö¸®³×¿ä...
Ä¿³Î¿¡¼­ ÀÚµ¿À¸·Î ¸·´Â°Ç°¡¿ä??

[guest@ftz guest]$ uname -a
Linux ftz.hackerschool.org 2.4.32 #1 Thu Jan 15 09:07:31 KST 2009 i686 i686 i386 GNU/Linux

root@Hydrogen:~# uname -a
Linux Hydrogen 3.0.0-17-generic #30-Ubuntu SMP Thu Mar 8 17:34:21 UTC 2012 i686 i686 i386 GNU/Linux

ÀÏ´Ü Ä¿³Î ¹öÁ¯ÀÌ ´Ù¸£±ä Çϳ׿ä;

  Hit : 4691     Date : 2012/04/25 10:08



    
cd80 ¾ÆÁ÷ °øºÎ°¡ ¹ÌÈíÇØ ´äº¯³»¿ëÀÌ Á¤È®ÇÏÁö ¾ÊÀ» ¼ö ÀÖ½À´Ï´Ù

Ä¿³Î¹öÁ¯¿¡µû¶ó ¼öÁ¤µÇ°Å³ª Ãß°¡µÈ ¸Þ¸ð¸® º¸È£ ±â¹ýµéµµ ÀÖ±¸¿ä
¿î¿µÃ¼Á¦°è¿­µé¿¡ µû¶ó¼­µµ º¸¾È±â¼úÀÌ °°°Ô Àû¿ëµÇÁø ¾Ê¾Ò½À´Ï´Ù
¿¹¸¦µé¾î Ä¿³Î 2.4À§¿¡ ÀÖ´Â ¿ìºÐÅõ¿Í Ä¿³Î 2.4À§¿¡ ÀÖ´Â Æäµµ¶ó»ó¿¡¼­ ½ÇÇàµÇ´Â ÀÀ¿ëÇÁ·Î±×·¥µéÀ» °ø°ÝÇϴ¹æ¹ýÀÌ Á¤È®È÷ ¶È°°Áø ¾Ê½À´Ï´Ù
¹°·Ð ¿©±â¼­µµ Ä¿³Î ÀÚüÀÇ Ãë¾àÁ¡À» ãÀ¸¸é ¹ü¿ëÀûÀ¸·Î °ø°Ý°¡´ÉÇѰÍÀ¸·Î ¾Ë°íÀÖ±¸¿ä

ÇöÀç FTZ¼­¹ö´Â Ä¿³Î¿¡¼­ ·£´ý½ºÅÃÆÐÄ¡¸¦ ÇÏÁö ¾ÊÀº »óÅÂÀÇ 2.4.20-8 ¹öÁ¯ÀÔ´Ï´Ù
ÀÎÅͳݿ¡¼­ ·¹µåÇÞ9¸¦ ¹ÞÀ¸½Ã¸é ±âº»ÀûÀ¸·Î ·£´ý½ºÅÃÀÌ Ãß°¡µÈ»óÅ·Π´Ù¿î¹ÞÀ¸½Ç ¼ö ÀÖ½À´Ï´Ù
( ftp://ftp.superuser.co.kr/linux/RedHat )

http://teamcrak.tistory.com/search/¸Þ¸ð¸®%20º¸È£%20±â¹ý
http://www.hackerschool.org/Sub_Html/HS_Service/DocuTrans/View_All.html?uid=5
2012/04/25  
¸Û¸Û ³×.. cd80´Ô ¸»¾¸´ë·Î bof ¹æÁö ÆÐÄ¡°¡ µÇ¾îÀÖ´Â OS ȯ°æ¿¡¼± ±âÁ¸ÀÇ °ø°Ý¹æ¹ýÀÌ Àû¿ëµÇÁö ¾Ê½À´Ï´Ù.
º¸¿©ÁֽŠ¿À·ù´Â SSP(Stack Smash Protection) ÆÐÄ¡·Î ÀÎÇÑ °ÍÀ¸·Î º¸À̳׿ä
±Ùµ¥ ÀÌ°Ç ¾Æ¸¶ GCC ·¹º§¿¡¼­ÀÇ ÆÐÄ¡ÀÏ °Ì´Ï´Ù.
µû¶ó¼­ ³·Àº ¹öÁ¯ÀÇ GCC¿¡¼­ ´ë»ó ÆÄÀÏÀ» ÄÄÆÄÀÏ ÇÑ ÈÄ ´Ù½Ã Çѹø ÇØº¸¼¼¿ä.
¹Ý¸é ASLRÀ̳ª DEP´Â Ä¿³Î ·¹º§¿¡¼­ÀÇ ÆÐÄ¡À̸ç, ´ÙÀ½ÀÇ ¸í·Éµé·Î ÀÓÀÇ disable ½Ãų ¼ö ÀÖ½À´Ï´Ù.
echo 0 > /proc/sys/kernel/exec-shield
echo 0 > /proc/sys/kernel/exec-shield-randomize
sysctl -w kernel.randomize_va_space=0
2012/04/25