Hi All,
This is just a write up about Word List Builder Buffer Overflow.
If you’re not familiar with Buffer Overflow please read those tutorials:
Exploit writing tutorial part 1 : Stack Based Overflows
Exploit writing tutorial part 3 : SEH Based Exploits
Exploit writing tutorial part 1 : Stack Based Overflows
Exploit writing tutorial part 3 : SEH Based Exploits
Triggering the vulnerability:
Well, opening an invalid (.dic) file will cause the overflow.
Now we have to find “next SEH” & “SEH” offset.
Run: !pvefindaddr suggest
We got it; Next SEH is overwritten after 4108 bytes.
The next steep is to find a pop pop ret, again the Corelan’s Tool;
Run: !pvefindaddr p
As you can see, all modules are SafeSEH compiled, except the binary, but we have to deal with null byte, so the shellcode must be placed before overwriting “next SEH” & “SEH”.
Let’s Exploit it.
Backward jump to the shellcode:
The exploit payload must look like this:
JUNK + SHELLCODE + JUMP + NSEH + SEH
Using an Egg hunter:
This way we only need to jump 34 bytes, and the Egg hunter will do the rest of the job, so the exploit payload will look like this:
JUNK + EGG + SHELLCODE + EGG-HUNTER + NSEH + SEH
6 comments:
Hey Are You Moroccan?
Yes, Moroccan
Good :) Keep up the Great Work Brother:)
Im From Safi :)
Thanks Brother,
ana Soussi
Nice To Meet you :)
Golli wach darouri Metasploit ila Bghina nl9aw Chi Buffer ?? ola XP 9adya lgharad ?
Good job man!
Post a Comment