Exploit Development | Format Strings Series 5/6 - Memory leak + ASLR bypass

preview_player
Показать описание

Environment: Ubuntu 16.04 x86
To enable ASLR (should be enabled by default): echo 2 | sudo tee /proc/sys/kernel/randomize_va_space

If you enjoyed this video, feel free to donate to your favorite open source tool. There are some great people out there providing us with amazing tools that allow us to do these stuff.
Рекомендации по теме
Комментарии
Автор

Good to see high quality videos on bypassing ASLR.

I was getting into making my own cool stuff but I gave up to learn regular corporate stuff and because ASLR on Windows was ruining my code.

I followed an old tutorial on 0x00sec and managed to route the start of execution on any binary to a code cave, calling MessageBoxA, but when I tried jumping back to main()/original entry point it crashed because I was getting the RVA inside the program instead of the actual address in memory, which is what Id need to push onto the stack.

I think overflow exploits are the way to go.

I havent tried this, but can you not simply find main() and overwrite whatever comes before it with shellcode, reouting execution to that point? So then after shellcode is run main() would run and execution would follow as normal.

victorandreverdipereira
Автор

Amazing content. I would love to see more!

michalisp.
Автор

Nice tutorial. Thx.a lot. Can you explain in 6m:13s, the code show what = leak -0x5a0 - 0x1b2000 + 0x3ada0. The hex number 0x5a0 came from what place ?

pwndumb
join shbcf.ru