Deok9_Exploit Technique

Similar documents
hlogin2

Deok9_PE Structure

hlogin7

No Slide Title

IDA 5.x Manual hwp

INTRO Basic architecture of modern computers Basic and most used assembly instructions on x86 Installing an assembly compiler and RE tools Practice co

Microsoft Word - Heap_Spray.doc

Microsoft Word - building the win32 shellcode 01.doc

Linux Binary Hardening with Glibc Hyeonho Seo

Cogame 취약점 보고

01.ROP(Return Oriented Programming)-x86 Excuse the ads! We need some help to keep our site up. List Return Oriented Programming(ROP) -x86 Gadgets - PO

Table Of Contents 1/7 0. Introduction 0-1. Introduction 0-1. Testing Environment 1. Software Vulnerabilty Review 1-1. Buffer OverFlow 1-2. Format Stri

Microsoft PowerPoint - a10.ppt [호환 모드]

목 차 1. 개요 취약점분석추진배경 취약점요약 취약점정보 취약점대상시스템목록 분석 공격기법및기본개념 시나리오 공격코드

Microsoft PowerPoint - a8a.ppt [호환 모드]

Microsoft Word - SEH_Overwrites_Simplified.doc

PowerPoint Template

강의10

02.Create a shellcode that executes "/bin/sh" Excuse the ads! We need some help to keep our site up. List Create a shellcode that executes "/bin/sh" C

목차 1. 소개... 3 가. BOF란?... 3 나. 윈도우 BOF 개발환경및사용툴 Shellcode 작성하기... 4 가. cmd 쉘 ) 소스코드작성 ) 디스어셈블리 ) 어셈블리코드편집 간단

Microsoft Word - FunctionCall

<4D F736F F F696E74202D204B FC7C1B7CEB1D7B7A55F F6E48616E646C6572B8A6C5EBC7D1BFA1B7AFB0CBC3E2B9D7BCF6C1A

No

Poison null byte Excuse the ads! We need some help to keep our site up. List 1 Conditions 2 Exploit plan 2.1 chunksize(p)!= prev_size (next_chunk(p) 3

6주차.key

PowerPoint 프레젠테이션

CKKeyPro 적용가이드

3.20 테러 악성코드바이너리분석 손충호 (StolenByte) WOWHACKER Group 해당문서는 WOWHACKER Group 의문서이므로, 무단도용및수 정및변조는할수없습니다. 페이지 1 / 20

PRO1_09E [읽기 전용]

Reusing Dynamic Linker For Exploitation Author : Date : 2012 / 05 / 13 Contact : Facebook : fb.me/kwonpwn

Microsoft Word - readme.doc

1.hwp

1

Level 4 ( hell_fire -> evil_wizard ) ~]$ cat evil_wizard.c /* The Lord of the BOF : The Fellowship of the BOF - evil_wizard

Microsoft Word - MS_rshd_exploit.doc

Microsoft Word - Reverse Engineering Code with IDA Pro-2-1.doc

*금안 도비라및목차1~9

歯박지원-구운몽.PDF

*금안14(10)01-도비라및목차1~12

ActFax 4.31 Local Privilege Escalation Exploit

0x00 Contents 0x About Nickster 0x Analaysis 0x Exploit

The_IDA_Pro_Book

화판_미용성형시술 정보집.0305

본문서는 Syngress 의 Writing Security Tools and Exploits Chap11 을요약정리한 것입니다. 참고로 Chap 10 ~ 12 까지가 Metasploit 에대한설명입니다. Metasploit Framework 활용법 1. Metasplo

/* */

=

Eureka Mail Client_v2.2.q를이용하여오믈렛에그헌팅에대하여알아볼것이다. 익스플로잇을위해구성된환경은아래와같다. - Windows XP Professional SP3 KOR - Python Ollydbg 1.x, Immunity Debugg

Exploit writing tutorials

how_2_write_Exploit_4_the_MSF_v3.x.hwp

Microsoft PowerPoint - a5a.ppt [호환 모드]

Microsoft PowerPoint - a6.ppt [호환 모드]

Microsoft Word - GOM-StackOverFlow.doc

various tricks for remote linux exploits v3.pptx

Return-to-libc

Microsoft PowerPoint - secu10.pptx

Microsoft Word - ExecutionStack

*금안 도비라및목차1~17

PowerPoint 프레젠테이션

취약점분석보고서 [Photodex ProShow Producer v ] RedAlert Team 안상환

untitled

2. GCC Assembler와 AVR Assembler의차이 A. GCC Assembler 를사용하는경우 i. Assembly Language Program은.S Extension 을갖는다. ii. C Language Program은.c Extension 을갖는다.

MicrocontrollerAcademy_Lab_ST_040709

0x <main+41>: lea eax,[ebp-264] 0x f <main+47>: push eax 0x080484a0 <main+48>: call 0x804835c <strcpy> 0x080484a5 <main+53>: add esp,0x1

Microsoft PowerPoint - o8.pptx

목차 1. 제품 소개 특징 개요 Function table 기능 소개 Copy Compare Copy & Compare Erase

2014밝고고운동요부르기-수정3

2005프로그램표지

토익S-채용사례리플렛0404

Heap Overflow By WraithOfGhost

Microsoft Word - MSOffice_WPS_analysis.doc

취약점분석보고서 [CyberLink Power2Go name attribute (p2g) Stack Buffer Overflow Exploit] RedAlert Team_ 강동우

ETOS Series 사용설명서

목차 1. 개요 USB 드라이버 설치 (FTDI DRIVER) FTDI DRIVER 실행파일 USB 드라이버 확인방법 DEVICE-PROGRAMMER 설치 DEVICE-PROGRAMMER

<C0CCBCBCBFB52DC1A4B4EBBFF82DBCAEBBE7B3EDB9AE2D D382E687770>

Microsoft PowerPoint - hy2-12.pptx

Microsoft Word - Reversing Engineering Code with IDA Pro-4-1.doc


자식농사웹완

chungo_story_2013.pdf

*중1부

2

Çѱ¹ÀÇ ¼º°øº¥Ã³µµÅ¥

...._



전반부-pdf

표1.4출력

003-p.ps

<4D F736F F F696E74202D20312E20B0E6C1A6C0FCB8C15F3136B3E2C7CFB9DDB1E25F325FC6ED28C0BA292E >

_

12월월간보고서내지편집3

중앙도서관소식지겨울내지33

에너지포커스 2007년 가을호


01_당선자공약_서울

인권문예대회_작품집4-2




목차

Transcription:

Exploit Technique CodeEngn Co-Administrator!!! and Team Sur3x5F Member Nick : Deok9 E-mail : DDeok9@gmail.com HomePage : http://deok9.sur3x5f.org Twitter :@DDeok9 << Contents >> 1. Shell Code 2. Security Cookie Overwriting 3. Trampoline Technique 4. SEH Overwriting 5. Heap Spray! 1! Copyright 2011 Deok9 All rights Reserved

1) Shell Code ( cmd.exe ) 1. Shell Code Window ShellCode WinExec. WinExec(LPCSTR lpcmdline,uint ucmdshow) Format. Linux /bin/sh. Assembly WinExec Depends Tool. [ 1-1 - 1 ] Depends Tool WinExec WinExec Kernel32.dll, Entry Point : 0x0006250D, Kernel32.dll Base Address : 0x7C7D0000, 0x7C83250D. Visual Studio cmd Code. [ 1-1 - 2 ] cmd Code cmd[4] WinExec, cmd [4], SW_SHOWNORMAL Option. Code main Breakpoint, Debugging Mode Disassemble Shell Code.! 2! Copyright 2011 Deok9 All rights Reserved

[ 1-1 - 3 ] Debugging Disassembly LEA edi, [ebp+ffffff34h] REP STOS dword ptr es:[edi] CMP esi, esp CALL 00411140. '\0' Shell Code NULL xor. CALL dword ptr ds:[0041819ch] [004182B4h] Data, Shell Code. Depends Tool. [ 1-1 - 4 ] Inline Assem Code Code Debugging Mode Disassemble Shell Code.! 3! Copyright 2011 Deok9 All rights Reserved

[ 1-1 - 5 ] Shell Code! 4! Copyright 2011 Deok9 All rights Reserved

1) Security Cookie? 2. Security Cookie Overwriting Window Stack, SFP Buffer Hacker Buffer Overflow Security Cookie Stack Security Data Security Cookie BOF. [ 2-1 - 1 ] IDA Security Cookie [ 2-1 - 2 ] Security Cookie Stack! 5! Copyright 2011 Deok9 All rights Reserved

2) Security Cookie Overwrite BOF Shell Code, RET ( EIP ) Memory Security Cookie, SFP, RET 3. RET Security Cookie Debugging Security Cookie [ 2-2 - 1 ] Security Cookie Save EAX B516410E, Security Cookie Check. [ 2-2 - 2 ] ECX Security Cookie 41414141,. [ 2-2 - 3 ] Security Cookie EIP Error Security Cookie, Error EIP, RET Error.! 6! Copyright 2011 Deok9 All rights Reserved

3. Trampoline Technique 1) ASLR ( Address Space Layout Randomization )? Process Mapping Object & Random, BOF Object BOF. [ 3-1 - 1 ] ASLR Visual Studio Alt + F7.. [ 3-1 - 2 ] ASLR! 7! Copyright 2011 Deok9 All rights Reserved

2) Trampoline Technique Trampoline JMP. [ 3-2 - 1 ] Trampoline Technique Memory RET Shell Code., ESP. ESP 00 NULL. Stack Random ASLR. ESP RET ( RET Memory ) ESP JMP ESP, CALL ESP [ 3-2 - 2 ].text Section ( Code ) [ 3-2 - 3 ] JMP ESP Code JMP ESP. ntdll 7CXXXXXX 00 NULL.! 8! Copyright 2011 Deok9 All rights Reserved

4. SEH Overwriting 1) SEH ( Structed Exception Handling )? Window, Program Hardware Exception, Handle Software Exception. Thread, Error Exception = Error. [ 4-1 - 1 ] Exception Handler EstabilisherFrame EXCEPTION_REGISTRATION. _CONTEXT *ContextRecord Thread. Exception Register. Exception Handler Chain insert, Chain EXCEPTION_REGISTRATION. [ 4-1 - 2 ] EXCEPTION_REGISTRATION EXCEPTION_REGISTRATION Pointer. Exception Handler Pointer. [ 4-1 - 3 ] SEH Chain Layout! 9! Copyright 2011 Deok9 All rights Reserved

2) SEH Overwriting Exception Stack SEH, ESP SEH Ret. Hacker SEH 2 ( Handler Next ) EIP. ESP Argument 2 POP POP RET, JMP [esp+8], CALL [esp+8], ADD esp,8 RET EIP. Handler Next. SEH Handler ( SEH Handler Code. ) [ 4-2 - 1 ] SEH Offset Backtrack patternoffset.pl SEH Handler. Offset Exploit Code [ 4-2 - 3 ] Exploit Code [ 4-2 - 3 ] ESP SEH RET ADD ESP, 8 RETN Handler Next, Next Hacker Shell Code JMP,. EB 06 90 90 SHORT JMP, Ollydbg.! 10! Copyright 2011 Deok9 All rights Reserved

5. Heap Spray 1) Heap Spray? Heap Memory Data EIP Heap,. html javascript Heap Memory Program. Code [ 5-1 - 1 ] Heap Spray Memory %u0505 ( NOP code ) + ShellCode 0x80000 Size Heap Memory. Hacker NOP EIP. Exploit Code Heap Memory [ 5-1 - 2 ] Heap Memory Dump Memory 05050505...... ( MOV edi, edi ).! 11! Copyright 2011 Deok9 All rights Reserved