lec08 remote exploit
play

Lec08: Remote Exploit Taesoo Kim 2 Scoreboard 3 NSA Codebreaker - PowerPoint PPT Presentation

1 Lec08: Remote Exploit Taesoo Kim 2 Scoreboard 3 NSA Codebreaker Challenges 4 Administrivia No class on Oct 28 If you are interested in, check out EKOPARTY CTF 2016 Due: Lab08 is out and its due on Nov 3 (two weeks!)


  1. 1 Lec08: Remote Exploit Taesoo Kim

  2. 2 Scoreboard

  3. 3 NSA Codebreaker Challenges

  4. 4 Administrivia • No class on Oct 28 • If you are interested in, check out EKOPARTY CTF 2016 • Due: Lab08 is out and its due on Nov 3 (two weeks!) • NSA Codebreaker Challenge → Due: Dec 1

  5. 5 Lab06: ROP

  6. 6 Discussion: Lab07 • What's the most "annoying" bug or challenge? • What's the most "interesting" bug or challenge? • So, ROP is too powerful?

  7. 7 Discussion: pop • What was the problem? • How did you solve?

  8. 8 Discussion: pop

  9. 9 Discussion: puzzle • What was the problem? • How did you solve?

  10. 10 Discussion: upto-retaddr • How much did you try? • Where did you stuck?

  11. 11 Discussion: find-gadget • What was the problem? • How did you solve?

  12. 12 Discussion: sprintf • How much did you try? • Where did you stuck?

  13. 13 Discussion: rop-sorting • How much did you try? • Where did you stuck?

  14. 14 Discussion: inc1 • How much did you try? • Where did you stuck?

  15. 15 Discussion: fmtstr-relro • How much did you try? • Where did you stuck?

  16. 16 Take-outs from ROP • DEP/ASLR are not perfect solutions • DEP: ret-to-lib, ROP • ASLR: code leakage • What about stack canary? (what if we placed it together?) • Lots of known defenses (did you attend today's talk?)

  17. 17 Today's Tutorial • In-class tutorial: • Socket programming in Python • Your first remote exploit!

  18. 18 Remote Challenges • Use techniques learned from Lab01-Lab07 • But targeting the remote server (e.g., online services)

  19. 19 DEMO: about how remote challenges work • nc • exploit.py

  20. 20 In-class Tutorial • Step1: nc • Step2: brute force attack • Step3: guessing attack $ git git@clone tc.gtisc.gatech.edu:seclab-pub cs6265 or $ git pull $ cd cs6265/lab08 $ ./init.sh $ cd tut $ cat README

  21. Lec08: Remote Exploit Taesoo Kim

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend