This time to learn and practice about attack vector exploit Easy Chat Server SEH application. It is different from the exploitation of the Big Ant server SEH apllication.
Tools :
- Wireshark
- Ollydbg
- Easy Chat Server running on Windows
First time we must try the error for the application.
|
Easy Chat Server On Windows |
|
Easy Chat Client |
First time we must recognize the application and try with error, in the picture above I try login with with accounts that have been registered. Now i will try login with user account unregistered, before tried i run the wireshark to sniffing the packet and to know the header and port which later will be the reference for making the fuzzer.
|
Easy Chat Client On Backtrack |
With the login page of easy chat client i will try to login with username and password with 1000 character A. Lets generate the 1000 characters A and lets see in the wireshark and application (got error or not).
|
Python generate |
Lets see the wireshark and Easy chat server, the easy chat server application haven't error.
|
Wireshark Network Analyze |
We have the network packet traffic and get the path of the header, ok try once againt with litle characters fill into the easy chat client login page, i will login with username "ABC" and Password "ABC" too. So we analyze with wireshark of the packet sent.
|
Try with unregistered account |
|
Wireshark |
The wireshark get the packet sent the client to the server with ABC, look the path. Lets make the fuzzer, the A character that will send as many as 25000 to the server via port 80.
|
Fuzzer 1 |
Lets running Ollydbg and attach the easy chat server application, and look the process after we run the fuzzer.
|
Wireshark capture HTTP traffict |
|
Olly dbg |
From the picture above seen any changes in memory at OllyDbg, this is SEH application so lets to view the SEH chain. here we know the SEH chain put the exception of the overwrite.
0 comments:
Post a Comment