Search K
Appearance
Appearance
Other ways to support HackTricks:
CET is a security feature implemented at the hardware level, designed to thwart common control-flow hijacking attacks such as Return-Oriented Programming (ROP) and Jump-Oriented Programming (JOP). These types of attacks manipulate the execution flow of a program to execute malicious code or to chain together pieces of benign code in a way that performs a malicious action.
CET introduces two main features: Indirect Branch Tracking (IBT) and Shadow Stack.
The shadow stack is a dedicated stack used solely for storing return addresses. It works alongside the regular stack but is protected and hidden from normal program execution, making it difficult for attackers to tamper with. The primary goal of the shadow stack is to ensure that any modifications to return addresses on the conventional stack are detected before they can be used, effectively mitigating ROP attacks.
ROP and JOP attacks rely on the ability to hijack the control flow of an application by leveraging vulnerabilities that allow them to overwrite pointers or return addresses on the stack. By directing the flow to sequences of existing code gadgets or return-oriented programming gadgets, attackers can execute arbitrary code.
Other ways to support HackTricks: