953, 9/48 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   rlaheehoon
   http://blog.naver.com/rlaheehoon
   BOF shell code ¸¸µå´Âµ¥ Áú¹®ÀÌ ÀÖ½À´Ï´Ù

http://www.hackerschool.org/HS_Boards/zboard.php?id=QNA_ETC&no=564 [º¹»ç]


´Þ°í³ª´ÔÀÇ ¹®¼­¸¦ º¸¸é¼­ µû¶óÇغ¸°í Àִµ¥¿ä

ÀÌ ¹®¼­¸¦ º¸¸é execve ¾È¿¡¼­ ·¹Áö½ºÅÍ¿¡ °ªµéÀ» ³Ö¾îÁØÈÄ int 0x80À¸·Î system callÀ» È£ÃâÇÏ´Â ÀÎÅÍ·´Æ®¸¦ ¹ß»ý½Ãŵ´Ï´Ù

±×·±µ¥ gcc version 4.6.1ÀÎ Á¦ ÄÄÇ»ÅÍ¿¡¼­ objdump Çغ¸¸é ´Ù¸¥ ¾î¼Àºí¸® ÄÚµå´Â ´Ù ¶È°°Àºµ¥
int 0x80ÀÌ ÀÖ¾î¾ß ÇÒ ºÎºÐ¿¡ call *0x80d70b0ÀÌ ÀÖ½À´Ï´Ù.
objdump -d shell | grep 80d70b0 ÇغÁµµ callÇÏ´Â ºÎºÐÀº ¸¹Àºµ¥ ±× ÁÖ¼Ò¿¡ ¹¹°¡ ÀÖ´ÂÁö´Â ³ª¿ÀÁö ¾Ê½À´Ï´Ù
¾Æ¹«·¡µµ ´Ù¸¥ ÇÁ·Î¼¼½º ¾ÈÀÇ instructionÀ» È£ÃâÇÏ´Â °Í °°½À´Ï´Ù

¶Ç, c¿¡¼­ ÀζóÀÎ ¾î¼Àºí·Î ÄÚµù ÇغÁµµ
"push $0x0068732f\n\t"
                "push $0x6e69622f\n\t"
                "mov %esp,%ebx\n\t"
                "push $0x0\n\t"
                "push %ebx\n\t"
                "mov %esp,%ecx\n\t"
                "mov $0x0, %edx\n\t"
                "mov $0xb, %eax\n\t"
                "int $0x80\n\t"
´Â Àß µÇÁö¸¸

"push $0x0068732f\n\t"
                "push $0x6e69622f\n\t"
                "mov %esp,%ebx\n\t"
                "push $0x0\n\t"
                "push %ebx\n\t"
                "mov %esp,%ecx\n\t"
                "mov $0x0, %edx\n\t"
                "mov $0xb, %eax\n\t"
                "call *0x80d70b0\n\t"
ó·³ ¸¶Áö¸·ÁÙÀ» ¹Ù²Ù¸é ¼¼±×¸àÅ×ÀÌ¼Ç ¿À·ù¸¸ ¹ß»ýÇÕ´Ï´Ù...

¿Ö ±×·±Áö ÇѼö °¡¸£ÃÄÁÖ½Ã¸é °¨»çÇÏ°Ú½À´Ï´Ù...

  Hit : 2614     Date : 2012/04/23 11:49



    
¸Û¸Û ÄÄÆÄÀÏ·¯°¡ ÃÖÀûÈ­¸¦ ÇÑ °Í °°³×¿ä volatile Å°¿öµå¸¦ ºÙ¿©¼­ ÄÄÆÄÀÏÇغ¸¼¼¿ä
asm volatile("NOP") ÀÌ·±½ÄÀ¸·Î..
±×¸®°í 0x80d70b0¿£ ¾Æ¸¶ ÇÔ¼öÅ×À̺íÀÌ ÀÖÀ» °Ì´Ï´Ù. gdb¸¦ ÀÌ¿ëÇÏ¿© µð¹ö±ëÇغ¸¼¼¿ä..
2012/04/23  
rlaheehoon ¾Æ gdb·Î ÇÏ´Ï ÀâÈ÷³×¿ä
¸î½ÊÁÙ µû¶ó°¡º¸´Ï int $0x80ÀÌ ÀÖ±ä ÀÖ³×¿ä ¹«½¼ ÃÖÀûÈ­ ÀÛ¾÷À» Çϴ°ÇÁö º¹ÀâÇؼ­ ¸ð¸£°Ú½À´Ï´Ù¸¸ ¤»¤»
objdump¿Í gdb°¡ ¹ºÁö Á¤È®È÷ °øºÎÇØ ºÁ¾ß°Ú½À´Ï´Ù

´äº¯ °¨»çÇÕ´Ï´Ù~
2012/04/25  
793   À½³È ·¹º§1´Ü°è ¾î¶°ÄÉ ÇؾßÇϴ°ÇÁö ¤Ð[2]     zzzguscjf
11/12 2609
792   ÁøÁ¤ÇÑ "ÇØÄ¿"ºÐµé ²À ºÁÁÖ¼¼¿ä!!![4]     rlatkddusdl
07/12 2785
791   ÁøÂ¥ ÀÏ·ù ÇØÄ¿ºÐµé...[1]     ±ÙµÎ¿î
03/12 3642
790   ÁøÂ¥ ´ä´ä ¤Ð¤Ð..[3]     winkivy
04/27 3436
789   Áø±Þ½ÃÇè     Error123
07/23 2443
788   BACKTRACK ½áº¸½ÅºÐ[1]     nsh009
08/04 2853
787   bash for¹®¿¡ ´ëÇؼ­...[4]     kimgs0725
09/15 2704
786   BlogSpear Áú¹®ÀÔ´Ï´Ù.[2]     ho7241
06/19 3225
  BOF shell code ¸¸µå´Âµ¥ Áú¹®ÀÌ ÀÖ½À´Ï´Ù[2]     rlaheehoon
04/23 2613
784   BOF °ø°ÝÀÌ kernel ¹öÁ¯¿¡ µû¶ó µÉ¶§µµ ÀÖ°í ¾ÈµÉ¶§µµ ÀÖ³ª¿ä?[2]     rlaheehoon
04/25 4027
783   BOF ¿Õ±âÃÊÆí¿¡ ³ª¿Â °Í ´ë·Î ½Ç½ÀÀ» ÇÏ·Á°íÇϴµ¥¿ä[1]     ggdg12
05/29 3607
782   bof ¿øÁ¤´ë ¸®´ª½º¿¡¼­ ÇÏ·Á¸é??[2]     hipro
04/12 2537
781   BSFC ½Ã½ºÅÛÀ̶ó´Â°ÍÀÌ ¹«¾ùÀΰ¡¿ä?     ninenight
04/16 4172
780   c ¾ð¾î ½ºÅ³ °¡¸£ÃÄ Áִ å ÃßõÇØÁà¿ä[2]     sidemirror
01/11 4055
779   C++´Ù¿î·Îµå °ü·Ã Áú¹®[1]     zzzguscjf
11/06 2644
778   C,C++°ú ÇØÅ·ÀÇ °ü·Ã¼º[2]     dony22
11/25 2740
777   Çáµå¿þ¾î ÇØÅ·¿¡ °üÇؼ­ Áú¹®ÇÕ´Ï´Ù.[1]     ggdg12
08/19 2609
776   ÇÁ·Î±×·¡¹Ö °øºÎ À¢¸¸Å­ ÇÏ¸é ±×´ÙÀ½Àº...?[2]     ±ÙµÎ¿î
02/25 2730
775   ÇÁ·Î±×·¥¹®ÀÇ µå¸³´Ï´Ù.     jk10211
12/26 2452
774   ÇÁ¸®Áðºê·¹ÀÌÅ© ½ÃÁð4 ñé[1]     13579
09/29 3153
[1][2][3][4][5][6][7][8] 9 [10]..[48]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org