EC-Council Certified Secure Programmer

EC-Council Certified Secure Programmer EC-Council Certified Secure Programmer

eccouncil.org
from eccouncil.org More from this publisher
11.07.2015 Views

Page 44• The Bind System Call• The Listen System Call• The Accept System Callo The Accept System Call: Sample Code• The dup2 System Calls• The execve System Call• Linux Port Binding Shellcode• Compile, Print, and Test Shellcode• Reverse Connection Shellcode• Socket Reusing Shellcode• Linux Implementation of Socket Reusing Shellcode• Reusing File Descriptors• Using the setuid Rooto Executing the setuid Programo System calls used by the setuid Root program• Using ltrace utility• Using GDB• Assembly Implementation• SysCall Trace• RW Shellcode• Encoding Shellcode• Decoder Implementation and Analysis• Decoder Implementation Program• Results of Implementation Program• OS-Spanning Shellcode• Assembly CreationModule 27: Writing Exploitshttp://www.eccouncil.orgEC-Council

• Introduction• Targeting Vulnerabilities• Remote and Local Exploits• A Two-Stage Exploit• Format String Attackso Example of a Vulnerable Program• Using %n Character• Fixing Format String Bugs• User-Supplied Format String Vulnerability CVE-2000-0763 in xlockmore• TCP/IP Vulnerabilities• Race Conditions• File Race Conditions• Signal Race Conditions• Input Validation Error in man Program• Input Validation Error in man Program (Snippet 1)• Input Validation Error in man Program (Snippet 2)• Writing Exploits and Vulnerability Checking Programso Writing Exploits and Vulnerability Checking Programs Sample Code• Stack Overflow Exploits• Memory Organization• Stack Overflows• Finding Exploitable Stack Overflows in Open-Source Software• Finding Exploitable Stack Overflows in Closed-Source Software• Heap Corruption Exploits• Doug Lea Malloc• Dlmalloc Chunk• Freed Dlmalloc Chunk• Vulnerable Program ExamplePage 45http://www.eccouncil.orgEC-Council

Page 44• The Bind System Call• The Listen System Call• The Accept System Callo The Accept System Call: Sample Code• The dup2 System Calls• The execve System Call• Linux Port Binding Shellcode• Compile, Print, and Test Shellcode• Reverse Connection Shellcode• Socket Reusing Shellcode• Linux Implementation of Socket Reusing Shellcode• Reusing File Descriptors• Using the setuid Rooto Executing the setuid Programo System calls used by the setuid Root program• Using ltrace utility• Using GDB• Assembly Implementation• SysCall Trace• RW Shellcode• Encoding Shellcode• Decoder Implementation and Analysis• Decoder Implementation Program• Results of Implementation Program• OS-Spanning Shellcode• Assembly CreationModule 27: Writing Exploitshttp://www.eccouncil.org<strong>EC</strong>-<strong>Council</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!