Partial Return Address Overwrite - Exploit Dev 10

Sdílet
Vložit
  • čas přidán 27. 08. 2024
  • 🔥 Learn How to Bypass ASLR using a partial RET overwrite
    👨‍💻 Buy Our Courses: guidedhacking....
    💰 Donate on Patreon: / guidedhacking
    ❤️ Follow us on Social Media: linktr.ee/guid...
    🔗 Article Link: guidedhacking....
    🔗 Exploit Education: exploit.educat...
    📜 Video Description:
    Bypassing ASLR without leaking a memory address? By utilizing a partial instruction pointer overwrite this exploitation technique becomes possible. What do we mean by that? We are talking about overwriting a portion of the return address.
    So far, the goal every time was to completely overwrite the return address, which led to full control over the instruction pointer (EIP/RIP, depending on the architecture) when writing binary exploits.
    Alternatively, one could also overwrite just parts of the return address, leading to partial control over the instruction pointer.
    There are two reasons why an attacker might do this:
    1) Because of limitations, controlling the whole RIP is impossible.
    2) There is no info leak that could be used to bypass ASLR
    Interestingly, different technologies or architectures use different kinds of endianness in certain situations. Modern computers use little-endian when working e.g. with memory and CPU registers. Because of that, a buffer long enough to exploit a buffer overflow will first overwrite the "last" byte of the return address.
    📝 Timestamps:
    0:00 Analyzing Source Code
    1:27 Partial RET Overwrite Explained
    2:14 GDB Setup and Analysis
    3:27 Join GuidedHacking.com
    3:57 Return Instructions
    4:50 Target Address Identification
    6:11 Base Pointer Adjustment
    7:00 Writing the Exploit Script
    8:16 Exploit Execution & Results
    ✏️ Tags:
    #exploitdevelopment #bufferoverflow #reverseengineering
    partial ret overwrite
    guidedhacking
    exploit dev
    partial return address overwrite
    exploit development
    partial return overwrite
    buffer overflow
    partial ret overwrites
    exploit development course
    partial return overwrites
    partial return address overwrites
    guided hacking
    buffer overflows
    binary exploitation
    ethical hacking
    exploit development tutorial
    binary exploitation tutorial
    binary exploit development

Komentáře •