HEVD Windows Kernel Exploitation 6: Use-After-Free

As this is the 5th vulnerability on HEVD (Use-After-Free), I’ll give a summary of what we’ve learned so far: Strategy: The strategy for this blogpost will be as follows: Initial Phase: Source Code Review As always we’ll check the C code first to understand where the vulnerability lies:  The structure of the code is the… Continue reading HEVD Windows Kernel Exploitation 6: Use-After-Free

HEVD Windows Kernel Exploitation 5: Uninitialized Stack Variable

Before I start talking about the 4th vulnerability on HEVD (Uninitialized Stack Variable), I’ll give a summary of what we’ve learned so far: With Stack Overfow:  put your shellcode in userland in an allocated memory and execute in kernelland With Arbitraty Overwrite: writing the value pointed by what to the memory location referenced by where With… Continue reading HEVD Windows Kernel Exploitation 5: Uninitialized Stack Variable

HEVD Windows Kernel Exploitation 4 – Null Pointer Dereference

So as we exploit the 3rd vulnerability on HEVD, I’ll use this as a tradition and will give history on what we’ve done so far and whats up next: With Stack Overfow:  put your shellcode in userland in an allocated memory and execute in kernelland With Arbitraty Overwrite: writing the value pointed by what to the… Continue reading HEVD Windows Kernel Exploitation 4 – Null Pointer Dereference

HEVD Windows Kernel Exploitation 3 -Write What Where

Let’s continue with the third blogpost of the Kernel exploitation series. Few notes: With Stack Overfow:  we put our shellcode in user-land in an allocated memory and execute in kernel-land With Arbitraty Overwrite: we’ll be writing the value pointed by “what” to the memory location referenced by “where” The strategy for this blogpost: Initial Phase: Source… Continue reading HEVD Windows Kernel Exploitation 3 -Write What Where

HEVD Windows Kernel Exploitation 1 – Setup the Environment

There will be few setup steps we need to follow before we jump into the Kernel Exploitation: Install Windows x86 in VM Install WinDBG 2. Setup the Debugging Symbols computer – properties – advanced system settings – emvironmental variables create a sys variable Variable Name: _NT_SYMBOL_PATH Variable Value: SRV*C:\Symbols*https://msdl.microsoft.com/download/symbols 3. Enable Debugging in BCD Run CMD as… Continue reading HEVD Windows Kernel Exploitation 1 – Setup the Environment

ROP Gadgets: VirtualProtect()

We’ll work on VUPlayer 2.49 (Windows 7) – ‘.m3u’ Local Buffer Overflow (DEP Bypass) for this article Initial exploit v1: EIP Control import sysimport structimport os  crash_file = “test.m3u” fuzz = “A” * 1012fuzz += “B” * 4fuzz += “C” * (3000 – len(fuzz))  file= open(crash_file, “w”)file.write(fuzz)file.close() Start the app and attach to Immunity Drag the m3u file on… Continue reading ROP Gadgets: VirtualProtect()

SLAE64: Assignment 7 – Cryptor

This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert (SLAE64) certification: https://www.pentesteracademy.com/course?id=7 Student-ID: PA-15847 The Objectives for the Assignment: – create a custom crypter- free to use any existing encryption schema- can use any programming language We’ll use the following encryption script for this assignment: I used the following… Continue reading SLAE64: Assignment 7 – Cryptor

Published
Categorized as SLAE64

SLAE64: Assignment 6 – Polymorphic Shellcode

This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert (SLAE64) certification: https://www.pentesteracademy.com/course?id=7 Student-ID: PA-15847 The Objectives for the Assignment: – Take up 3 shellcode from shell-storm and create polymorphic versions of them to beat pattern matching- the polymorphic versions cannot be larger 150% of the existing shellcode- bonus points… Continue reading SLAE64: Assignment 6 – Polymorphic Shellcode

Published
Categorized as SLAE64

SLAE64: Assignment 5: Shellcode Analysis

This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert (SLAE64) certification: https://www.pentesteracademy.com/course?id=7 Student-ID: PA-15847 The Objectives for the Assignment: – Take up at least 3 shellcode samples created using msfpayload for linux x86- use gdb to dissect the functionality of the shellcode- document your analysis I chose the following… Continue reading SLAE64: Assignment 5: Shellcode Analysis

Published
Categorized as SLAE64