Static PIE: How and Why

DerbyCon 6.0 - Recharge

Presented by: Adam Cammack, Brent Cook (busterbcook)
Date: Sunday September 25, 2016
Time: 13:00 - 13:50
Location: Regency South
Track: Teach Me

Self-relocating executables without external dependencies (static PIE) have been an area of interest in embedded systems and defensive security research inside OpenBSD. We will explore how to create these binaries, how they are currently being used in defensive security, and novel offensive applications involving code execution in highly restricted environments. We will then demonstrate a new Metasploit payload that reflectively injects itself into running Linux processes.

Adam Cammack

Adam Cammack is a Software Engineer for Metasploit at Rapid7. He new to security, coming from application development with emphasis on distributed computing and systems programming. He enjoys breaking things (then fixing them) and abusing file formats. Adam has spoken at Austin Hackers Anonymous and Rapid7 trainings.

Brent Cook

Brent Cook is the Engineering Manager of Metasploit at Rapid7, an OpenBSD committer, and the portable maintainer for LibreSSL and OpenNTPD. He focuses on offensive and defensive software engineering. He has worked at BreakingPoint Systems, Ixia, Boundary, and Calxeda in hardware, firmware, and software design roles. Brent has spoken previously at Infosec Southwest 2016 and smaller meetups such as OpenBSD Hackathons and Austin Hackers Anonymous.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats