background preloader

SmashTheStack Wargaming Network

SmashTheStack Wargaming Network

Fusion About Fusion is the next step from the protostar setup, and covers more advanced styles of exploitation, and covers a variety of anti-exploitation mechanisms such as: Address Space Layout RandomisationPosition Independent ExecutablesNon-executable MemorySource Code Fortification (_DFORTIFY_SOURCE=)Stack Smashing Protection (ProPolice / SSP) In addition to the above, there are a variety of other challenges and things to explore, such as: Cryptographic issuesTiming attacksVariety of network protocols (such as Protocol Buffers and Sun RPC) At the end of Fusion, the participant will have a through understanding of exploit prevention strategies, associated weaknesses, various cryptographic weaknesses, numerous heap implementations. Download Downloads are available from the download page Getting started Have a look at the levels available on the side bar, and pick which ones interest you the most. To get root for debugging purposes, do "sudo -s" with the password of "godmode".

About Exploit Exercises Malware Analysis Tutorial 11: Starling Technique and Hijacking Kernel System Calls using Hardware Breakpoints Learning Goals:Understand hardware breakpointUnderstand vectored/structured exception handlingUnderstand the tricks that interrupt module loadingApplicable to:Operating Systems.Computer Security.Programming Language Principles.Assembly Language.1. Introduction Starling is a bird that steals nests of other birds. In this tutorial, you will look at a "starling" technique used by Max++ to run its own malicious code using the "body" of another benign module named "lz32.dll". 2. (1) Clear all hardware breakpoints. (2) In code pane, right click and go to expression "0x4014F9" (3) right click and then "breakpoints -> hardware, on execution" (4) Press F9 to run to 0x4014F9 (4) If you see a lot of DB instructions, select them and right click -> "During next analysis treat them as Command". (5) Restart Max++ and run to 0x4014F9 again. 3. According to [1], zwAllocateVirtualMemory has 6 parameters, as shown in the following: (1) Where is the data from? 3.3. 4. //for x86 typedef struct _CONTEXT {

Related: