Skip to main content

Posts

Showing posts from 2016

Exploit Development on Linux Platform Part - 5

Exploiting the  Vulnerable Code on Linux  Introduction     Welcome to module 5, the last module of this workshop. So far in this workshop, we have been learning about debugging and how to work with GDB in Linux and, most importantly, controlling the EIP register. Prrequisite      It is strongly recommended that you should first complete the previous four modules of this workshop and then start completing this module.                   In this module, we will try to go to the level of exploitation while getting help from GDB so that we know how we can develop exploit in Linux. Controlling EIP           We have already presented how to control EIP in our previous module and what role GDB can play in debugging and giving you information about registers.       Now, let’s focus on first having a small shellcode which we can create easily and as we need. To demonstrate exploitation we need to have a shellcode. Download shellcode generator          You can do

Exploit Development on Linux Platform Part - 4

Vulnerable Code in “C” Language  Introduction     Welcome to module 4 of this workshop. In this module, we will experience some debugging with the vulnerable code based on Linux platform and we will be using “C” as our programming language. Prerequisites To get the most out of this module, it is recommended that you should have: • Complete previous three modules • Background in programming at least at a beginner level • Understands TCP/IP • Beginner level knowledge in information security • Passion to learn ethical hacking • Understand Debugging and Know GDB This module will not be as theoretical as we had in previous modules; however, what we will cover in our lab is the debugging on Linux and how to make good use of it for exploit development. The key of exploit development is controlling EIP, and in this module we will go to the level of overwriting EIP register with the help of GDB in debugging. Debugging on Linux with GDB We have already spoken about GDB

Exploit Development on Linux Platform Part - 3

     Buffer overflows Introduction    Welcome to module 3 of this workshop. So far we have discussed the Linux operating system and debugging on Linux platform. In this module, we will be talking about Buffer overflows in more granular detail and we will try to focus buffer overflows as generic as we can in order to keep this concept independent from any specific platform. This would be more of a knowledge-based module, which will hopefully build baseline knowledge about buffer overflows, its types, precautionary measures, and the reasons for buffer overflows.     We will be also discussing types of overflows and how you can exploit them and get the illegitimate access to the operating system. Prerequisites • Knowledge of TCP/IP protocols • Basic knowledge of operating systems • Complete the previous two modules of this workshop • Should have at least beginner level concepts in programming The Basics      A stack is a contiguous block of memory which is used by

Exploit Development on Linux Platform Part - 2

Linux Basics and Command Line  Introduction          Welcome to the Module 2 of this workshop. So far in this workshop, we have talked about GCC & GDB and Ubuntu Linux setup. Linux is basically an open source operating system which s based on the Unix platform. However, Linux is now a much more enhanced, strong, fast and much more reliable operating system, which steps ahead of the Windows platform. In this module, we will explore Linux and its different flavors. We will be learning different techniques and commands that you should know in order to use Linux as a normal user, at minimum. PreRequisite Since we will be learning about Linux knowledge base, this module doesn’t require any prerequisites, especially on Linux, however, you should be a computer user and have prior experience with DOS. Linux Key Components It is very difficult to completely cover all Linux components aspects in one workshop, however, we will be presenting the overall overview here on

Exploit Development on Linux Platform Part - 1

Setting up the  Linux Environment   Introduction           Welcome to the workshop on Linux exploit development.In this workshop, we will explore how you can work on exploit development while being on Linux as an operating system. To complete this workshop, you are supposed to have prerequisite requirements in Linux as an operating system.   Prerequisite • Knowledge of TCP/IP protocols • Basic knowledge of Linux as an Operating System • Prior hands-on experience with Linux • Sound Knowledge of “C” programming on Linux • Understand socket programming Lab Requirements      To complete this workshop, you basically need a Linux operating system and programming  skills.To entertain all levels of audience, we will still present how to setup Linux as an Operating System on Virtual Machine.  We will be setting up Ubuntu Linux on VMware Fusion on Mac OS.    Download Link: https://my.vmware.com/web/vmware/downloads.      We will then be using GDB (GNU Debugger) for debugging the p