271
Chapter 10
Windows Exploit
Development Basics
This chapter will walk you through the process of developing a simple stack-based
overflow exploit
on Windows; though there is a lot to exploit development this should be a great place to get
started. The key behind the exploit development process is to replace the programs instructions
with our instructions. This could be accomplished by making the program crash or making it
behave in an unexpected manner and therefore overwriting the memory
segments with our own
piece of code which otherwise is known as Shellcode.
There are many types/classes of memory corruption such as buffer overflows and use-after-free.
In this chapter we will focus on stack-based overflows, which are part of buffer overflows.
Prerequisites
◾
Windows XP Machine Service Pack 2
◾
Immunity Debugger
◾
Active Perl
for running Perl scripts
◾
mona.py
◾
Fuzzer—Create one or use the ones built into BackTrack
◾
A vulnerable application
For the sake of simplicity we will use Windows XP SP2 to demonstrate our exploit. There are many
other security measures implemented in and bypasses developed
for later versions of Windows;
however, we won’t talk about them in this chapter.
Dostları ilə paylaş: