1
May 15, 2009 Practical Aspects of Security
- Prof. Michael Backes
Control Hijacking Attacks C t lin Hri cu May 15, 2009 1 - - PowerPoint PPT Presentation
Practical Aspects of Security Prof. Michael Backes Control Hijacking Attacks C t lin Hri cu May 15, 2009 1 Substituting Prof. Backes 2 Control hijacking attacks Attackers goal: Take over target machine (e.g. web server)
1
2
3
4
5
6
7
8
Source: NVD/CVE
9
10
11
13
16
17
18
str ret sfp buf top of stack str top of stack *str ret
19
(exact shellcode given by Aleph One)
str top of stack exec(“/bin/sh”) ret
20
– (2005) Overflow in MIME type field in MS Outlook – (2005) Overflow in Symantec Virus Detection
21
buf[128] FuncPtr
23
FP1 FP2 FP3
24
FP1 FP2 FP3
31
32
– this might break legitimate uses
33
34
35
36
37
38
stack pointer 0xdeadbeef pop %ebx; ret mov $0xdeadbeef, %ebx instruction pointer
39
40
41
42
43
44
45
Source: NVD/CVE
47
48
49
50
51
52
53
54
55
56
57