Buffer Overflows: ( Dissecting The Exploit)
Buffer Overflows: ( Dissecting The Exploit)
http://www.JasonDion.com
Attacker’s Methodology
Covering
Scanning Escalation Tracks
Performing Gaining Maintaining
and of and
Reconnaissance Access Access
Enumeration Privilege Placing
Backdoors
Pre-Attack Steps
Risk Level
Phone: 555-1234
http://www.JasonDion.com Buffer Overflows
Buffer Usage
Example of an 8-bit Buffer (A)
A
0 1 2 3 4 5 6 7
Phone: 555-1234
http://www.JasonDion.com Buffer Overflows
Buffer Usage
Example of an 8-bit Buffer (A)
A 5 5 5 - 1 2 3 4
0 1 2 3 4 5 6 7
Phone: 555-1234
http://www.JasonDion.com Buffer Overflows
What is a Buffer Overflow?
• When a program puts
more data into a
buffer than the buffer
can hold
A 5 5 5 - 1 2 3 4
0 1 2 3 4 5 6 7
B
0 1 2 3 4 5 6 7
Phone: 555-1234
http://www.JasonDion.com Buffer Overflows
Buffer Overflow
Example of an 8-bit Buffer (A)
A
0 1 2 3 4 5 6 7
B
0 1 2 3 4 5 6 7
Phone: 555-1234
210-555-1234
http://www.JasonDion.com Buffer Overflows
Buffer Overflow
Example of an 8-bit Buffer (A)
A 2 1 0 - 5 5 5 -
0 1 2 3 4 5 6 7
B 1 2 3 4
0 1 2 3 4 5 6 7
Phone: 555-1234
210-555-1234
http://www.JasonDion.com Buffer Overflows
How does the exploit work?
• Stack is a reserved area of
memory where the program
saves the return address
when a call instruction is
received
Covering
Scanning Escalation Tracks
Performing Gaining Maintaining
and of and
Reconnaissance Access Access
Enumeration Privilege Placing
Backdoors
Pre-Attack Steps
Risk Level
http://www.JasonDion.com