With the ever increasing importance of providing and maintaining reliable services for both infrastructure support as well as business continuity, companies rely upon the IBM AIX operating system. In most cases, these machines hold the most critical data available for their business which makes IBM AIX a highly valued target from a hacker’s perspective. Over the past decade, hackers have increasingly focused on infiltrating valuable data such as proprietary databases, credit information, product pricing information and more. As such, the importance of protecting the IBM AIX operating system should be priority one.
Initial heap exploitation research was first documented and published by David Litchfield, in August of 2005. His paper entitled, ”An Introduction to Heap overflows on AIX 5.3L” focused on AIX heap abuse within the utilization of heap’s free()/rightmost() functions.
**NOTE: We will review the Litchfield methodology as well as look at a NEW, NEVER BEFORE SEEN methodology for taking control of the flow of code execution on IBM AIX systems when leveraging only 8 bytes of memory corruption. The Litchfield methodology will only work 50% of the time, in which case this new methodology is required to take control of the flow of execution.
Loading more stuff…
Hmm…it looks like things are taking a while to load. Try again?