953, 17/48 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   rlaheehoon
   http://blog.naver.com/rlaheehoon
   BOF shell code ¸¸µå´Âµ¥ Áú¹®ÀÌ ÀÖ½À´Ï´Ù

http://www.hackerschool.org/HS_Boards/zboard.php?id=QNA_ETC&no=564 [º¹»ç]


´Þ°í³ª´ÔÀÇ ¹®¼­¸¦ º¸¸é¼­ µû¶óÇغ¸°í Àִµ¥¿ä

ÀÌ ¹®¼­¸¦ º¸¸é execve ¾È¿¡¼­ ·¹Áö½ºÅÍ¿¡ °ªµéÀ» ³Ö¾îÁØÈÄ int 0x80À¸·Î system callÀ» È£ÃâÇÏ´Â ÀÎÅÍ·´Æ®¸¦ ¹ß»ý½Ãŵ´Ï´Ù

±×·±µ¥ gcc version 4.6.1ÀÎ Á¦ ÄÄÇ»ÅÍ¿¡¼­ objdump Çغ¸¸é ´Ù¸¥ ¾î¼Àºí¸® ÄÚµå´Â ´Ù ¶È°°Àºµ¥
int 0x80ÀÌ ÀÖ¾î¾ß ÇÒ ºÎºÐ¿¡ call *0x80d70b0ÀÌ ÀÖ½À´Ï´Ù.
objdump -d shell | grep 80d70b0 ÇغÁµµ callÇÏ´Â ºÎºÐÀº ¸¹Àºµ¥ ±× ÁÖ¼Ò¿¡ ¹¹°¡ ÀÖ´ÂÁö´Â ³ª¿ÀÁö ¾Ê½À´Ï´Ù
¾Æ¹«·¡µµ ´Ù¸¥ ÇÁ·Î¼¼½º ¾ÈÀÇ instructionÀ» È£ÃâÇÏ´Â °Í °°½À´Ï´Ù

¶Ç, c¿¡¼­ ÀζóÀÎ ¾î¼Àºí·Î ÄÚµù ÇغÁµµ
"push $0x0068732f\n\t"
                "push $0x6e69622f\n\t"
                "mov %esp,%ebx\n\t"
                "push $0x0\n\t"
                "push %ebx\n\t"
                "mov %esp,%ecx\n\t"
                "mov $0x0, %edx\n\t"
                "mov $0xb, %eax\n\t"
                "int $0x80\n\t"
´Â Àß µÇÁö¸¸

"push $0x0068732f\n\t"
                "push $0x6e69622f\n\t"
                "mov %esp,%ebx\n\t"
                "push $0x0\n\t"
                "push %ebx\n\t"
                "mov %esp,%ecx\n\t"
                "mov $0x0, %edx\n\t"
                "mov $0xb, %eax\n\t"
                "call *0x80d70b0\n\t"
ó·³ ¸¶Áö¸·ÁÙÀ» ¹Ù²Ù¸é ¼¼±×¸àÅ×ÀÌ¼Ç ¿À·ù¸¸ ¹ß»ýÇÕ´Ï´Ù...

¿Ö ±×·±Áö ÇѼö °¡¸£ÃÄÁÖ½Ã¸é °¨»çÇÏ°Ú½À´Ï´Ù...

  Hit : 2623     Date : 2012/04/23 11:49



    
¸Û¸Û ÄÄÆÄÀÏ·¯°¡ ÃÖÀûÈ­¸¦ ÇÑ °Í °°³×¿ä volatile Å°¿öµå¸¦ ºÙ¿©¼­ ÄÄÆÄÀÏÇغ¸¼¼¿ä
asm volatile("NOP") ÀÌ·±½ÄÀ¸·Î..
±×¸®°í 0x80d70b0¿£ ¾Æ¸¶ ÇÔ¼öÅ×À̺íÀÌ ÀÖÀ» °Ì´Ï´Ù. gdb¸¦ ÀÌ¿ëÇÏ¿© µð¹ö±ëÇغ¸¼¼¿ä..
2012/04/23  
rlaheehoon ¾Æ gdb·Î ÇÏ´Ï ÀâÈ÷³×¿ä
¸î½ÊÁÙ µû¶ó°¡º¸´Ï int $0x80ÀÌ ÀÖ±ä ÀÖ³×¿ä ¹«½¼ ÃÖÀûÈ­ ÀÛ¾÷À» Çϴ°ÇÁö º¹ÀâÇؼ­ ¸ð¸£°Ú½À´Ï´Ù¸¸ ¤»¤»
objdump¿Í gdb°¡ ¹ºÁö Á¤È®È÷ °øºÎÇØ ºÁ¾ß°Ú½À´Ï´Ù

´äº¯ °¨»çÇÕ´Ï´Ù~
2012/04/25  
633   ÁøÁ¤ÇÑ "ÇØÄ¿"ºÐµé ²À ºÁÁÖ¼¼¿ä!!![4]     rlatkddusdl
07/12 2790
632   ´Ù½Ã±Ý ±ÛÀ» ¿Ã¸®³×¿ä...[1]     rlatkddusdl
07/12 2434
631   ÇØÄ¿µÇ°í½ÍÀºµ¥Ã¥;;;[2]     rlatkddusdl
07/16 2683
630   Æ÷¸ËÇÏ°í½ÍÀºµ¥[1]     rlatkddusdl
07/22 2537
629   puttyÁú¹®     rlarhkddns
05/01 2488
  BOF shell code ¸¸µå´Âµ¥ Áú¹®ÀÌ ÀÖ½À´Ï´Ù[2]     rlaheehoon
04/23 2622
627   BOF °ø°ÝÀÌ kernel ¹öÁ¯¿¡ µû¶ó µÉ¶§µµ ÀÖ°í ¾ÈµÉ¶§µµ ÀÖ³ª¿ä?[2]     rlaheehoon
04/25 4033
626   vi ÆíÁý±â ¾²´Âµ¥.... ÀúÀåÀÌ ¾ÈµÇ¿ä ¤Ñ¤Ñ;;;     rlagudwns14
01/14 4633
625   »çÀÌÆ® ¿î¿µÀÚ¿¡°Ô ¹®ÀÇÇϴ¹ýÀº ¹º°¡¿ä??     rladudrn123
05/01 2806
624   °øºÎÇϴµ¥ ÀÖ¾î ¹æÇâ°ú Á¶¾ðÁ»     rkwhr6784
04/12 2210
623 ºñ¹Ð±ÛÀÔ´Ï´Ù  ÇØÄ¿ ½ºÄ𠸸ȭ °­ÀÇ     rkdsod9386
09/16 0
622   ftz ·¹º§Ç®´Ù°¡ ½Ç¼ö¸¦ÇÞ¾î¿ä... ·¹º§4 Ç®´Ù°¡¿ä[2]     rkdrlwn2206
12/05 2646
621   ÇØÅ·°ø°ÝÀÇ ¿¹¼ú     rjsgnl5512
03/23 2581
620   ÇØÅ· óÀ½ºÎÅÍ °°ÀÌ °øºÎÇϽǺР¸ðÁý[1]     riotgimozzi
11/26 3243
619   ÇØÅ·Åø     rhakswhagofk
05/19 2739
618   ÇØÄ¿½ºÄð Æ÷ÀÎÆ® °ü·ÃÀä[3]     reverse72
04/23 3517
617   ¹æÇнÃÁð¿¡[2]     reverse72
06/18 3069
616   i3- 2¼¼´ë¿Í i5-2¼¼´ë Â÷ÀÌÁ¡Á» ¾Ë·ÁÁÖ¼¼¿ä[3]     reverse72
07/25 3670
615   ftz ¿îµ¿Àå¿¡¼­ my-pass ¸í·É¾î °ü·Ã Áú¹®ÀÔ´Ï´Ù.[1]     reika
03/02 3609
614   c¾ð¾î ¹è¿ì°í ½Í¾î¿ä!!![2]     reborn
11/08 2470
[1]..[11][12][13][14][15][16] 17 [18][19][20]..[48]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org