Jumat, 17 Februari 2012

Buffer Overflow BigAnt Server "SEH and safeSEH"

type script below :
Run BigAnt server. Click file server > run service control
Run ollyDbg. Click file attach, search Antserver > click attach
Fuzzer application try to send buffer data of 2500 byte to BigAnt server. See the results:
EIP register not affected to buffer of send. To look into SEH, choose view > SEH chain
Visible buffer sent are stored in SEH Chain. EIP value to be 41414141




that the buffer has sent into the stack. For see data which is into application memory, right click line stack > follow in dump
copying file vbajet32.dll in system backtrack. File vbajet32.dll on windows, you can looking in windows > system32 > vbajet32.dll
Open metasploit at comand prompt filewith cd /pentest/exploit/framework
type:
rate  0 at Dllcharacteristics mean this module dont have SEH protection or safeSEH in it.

For search POP, POP RETN in module, open OllyDbg click view > Executable module > double click vbajet32.dll at fil. After that right click > Search for > Sequence of commands
input POP r32, POP r32, and RETN
Now OllyDbg has found address in the memory vbajet32.dll
Open terminla and search ./pattern_create.rb
Copy pattern_create.rb into script and run script again. BigAnt has been crash. Note value at EIP.
Open terminal and search pattern_offset with value contained in the EIP
Type script this below
Script sucessfully executed, buffer value \x41 success entry into SEH handler

 Type script below to enter address offset from vbajet32.dll
See that the process has break by OllyDbg exactly when it will access the address 0FA196A
looking SEh chain
push shift + f9 to countinue prosses in memory vbajet32.dl
 To see memory address a great, right click on the first address of the "012CFD7C" > follw in dump > selection
Run msfweb on terminal
get payload into metasploit
Copy payload and entry into script
Run script and find SEH Chain
Iam try to run script and result is :

and a know this payload any bad character. Iam reply to build payload with how to clean bad character "\x20\x25"
Reply copy payload this below to script:
run again this script
and now see the result
success to exploit..... and i know bad character on \x20\x25\x0D\x0A\2F\x00\x3A.







Tidak ada komentar:

Posting Komentar