Friday, February 24, 2012

PRACTICAL SEH : BIG ANT SERVER EXPLOITATION part 1

SEH (Structured Exception Handler) exploit can be written to target a Windows host. We use the buffer overflow vulnerability in the Big Ant Server software as a detailed example of this exploit type.

Purpose Learning :
Understanding the concept of SEH, SafeSEH, Bad Charachter, Payload, Exploit

 
Big Ant Server On Windows
Making the fuzzer with python language to trigger a buffer overflow.
Fuzzer1
Start the BigAnt Server, open the ollydbg and attach process of BigAntServer and play the ollydbg to analisys the process. Next run the fuzzer from Bactrack, after the fuzzer run BigAnt application is normally not the case crash like fuzzing for non SEH.
After Fuzzing
 In the picture above the EIP not overwrite, lets see the SEH chain by view -> SEH Chain.
SEH Chain
This indicates that the application is the SEH. Next cek into the EIP with press SHIFT + F9, the EIP is overwrite with 41414141.
EIP Overwrite
Stack overwite too with charachter AAAAA. Lets cek the stack overflow in the memory dump to see the buffer by right click in the stack overwrite with character AAAA and follow in the dump. In the moemory dump full of 41 41 41 41.
Stack Overflow
Dump
Next lets to see the modules by view the executable modules to know what modules are loaded by the application.
Executable Module
Vbajet module


I choose the vbajet.dll because this file dosnt have the features of image DLLCharacteristics No SEH. To further more analisys the modulle yo can put the module and working with backtrack tools laik MSFPESCAN to accounting and analyze.
MSFPESCAN
Back to the Ollydbg, next phase are find the POP, POP, RETN that are often used. its used to by passing the SEH directly into the EIP and we will be able to controll of the EIP. In the CPU left above by right click and search for sequence of command.
CPU
Find Sequence of commands
POP POP RETN
To be continue

0 comments:

Post a Comment