nullcon 2011 - buffer underrun exploits

12
By Saurabh Sharma & Chinmaya Kamal (SETLabs, Infosys) http://null.co.in/ http://nullcon.net/ Saurabh & Chinmaya

Upload: nu-the-open-security-community

Post on 18-May-2015

1.047 views

Category:

Technology


2 download

DESCRIPTION

Buffer UnderRun Exploits by Chinmaya Kamal & Saurabh Sharma

TRANSCRIPT

Page 1: nullcon 2011 - Buffer UnderRun Exploits

By Saurabh Sharma & Chinmaya Kamal(SETLabs, Infosys)

http://null.co.in/ http://nullcon.net/Saurabh & Chinmaya

Page 2: nullcon 2011 - Buffer UnderRun Exploits

● Buffer overflow attacks

● Cookie prevention

● Buffer Under Run Attacks

Saurabh & Chinmaya

Page 3: nullcon 2011 - Buffer UnderRun Exploits

•In some languages like C, boundchecking mechanisms are notimplemented. When the input data whichis used to fill the buffer is greater thanthe size of the allocated buffer, othervalues in the stack get overwritten. If theattacker designs this input carefully, hecan overwrite the return address with theaddress of his will. This address maypoint to some custom code, can be amalicious shell code. These attacks areknown as buffer overflow attacks.

•Buffer overflow attacks are caused when the buffers such as arraysare filled without the proper bound checking.

Saurabh & Chinmaya

Page 4: nullcon 2011 - Buffer UnderRun Exploits

Saurabh & Chinmaya

Page 5: nullcon 2011 - Buffer UnderRun Exploits

Saurabh & Chinmaya

Page 6: nullcon 2011 - Buffer UnderRun Exploits

Saurabh & Chinmaya

Page 7: nullcon 2011 - Buffer UnderRun Exploits

Saurabh & Chinmaya

Page 8: nullcon 2011 - Buffer UnderRun Exploits

Saurabh & Chinmaya

Page 9: nullcon 2011 - Buffer UnderRun Exploits

Demo

Saurabh & Chinmaya

Page 10: nullcon 2011 - Buffer UnderRun Exploits

Saurabh & Chinmaya

•PHP5 Space Trimming Buffer Under Flow (Header(), MacOSX)

Page 11: nullcon 2011 - Buffer UnderRun Exploits

Saurabh & Chinmaya

Page 12: nullcon 2011 - Buffer UnderRun Exploits

Thank You

Saurabh & Chinmaya