Questions about this topic? Sign up to ask in the talk tab.

ASLR

From NetSec
Revision as of 09:27, 5 June 2012 by LydaGoblemj (Talk | contribs)

Jump to: navigation, search

Address Space Layout Randomization

A runtime security measure that randomizes the memory addresses that programs load data and code into. Usually implemented at the Operating System level, this will change the location of loaded code at each boot for libraries that are nx compliant. ASLR Bypass is typically achieved by exploiting a non nx compliant library in the context of an nx compliant operating system. You can disable ASLR on Linux (it's enabled by default on all 2.6.*) by typing:

sudo echo 0 > /proc/sys/kernel/randomize_va_space

into your command line, note that you will need access to root.

ASLR is implemented in Linux Kernel 2.6*, Windows XP SP3 and the more recent versions (Vista, 7, and 8).

ASLR is part of a series on countermeasures.