Latest LQ Deal: Linux Power User Bundle
Go Back > Forums > Linux Forums > Linux - Security
User Name
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.


  Search this Thread
Old 10-11-2007, 11:27 AM   #1
LQ Newbie
Registered: Oct 2006
Posts: 9

Rep: Reputation: 0
Possible anti-exploitation measures in

I put this in Security, as I thought it would more likely attract people knowledgeable about the subject, than in the general slack 12.0 forum.

Anyway, as is indicated, I'm using slack 12.0 and kernel
I am a C programmer and I like to experiment with various exploitation techniques, such as buffer overflows and format string vulns and et cetera. However, due to various reasons, I haven't been using linux for almost, well, 6 months now, and therefore haven't really been playing around with those techniques.

I decided to start again, as I just got a new laptop, and downloaded and install slack 12.0.

During my endeavors to exploit a simple application locally, I've run into nothing but trouble. First, I noticed that the kernel used stack address space randomization, and found out how to disable that. However, I also noticed how sometimes, the little-endianness(this is the only way I can describe it really) was strange. Like it reverse the bytes in two-byte words instead of 4 byte words.

An example would be the following:

I have shellcode which spawns a shell when executed. On the disk, for some reason, it looks like this:

$ hexdump shellcode
0000000 c031 46b0 db31 c931 80cd 16eb 315b 88c0
0000010 0743 5b89 8908 0c43 0bb0 4b8d 8d08 0c53
0000020 80cd e5e8 ffff 2fff 6962 2f6e 6873
but disassembles to

00000000  31C0              xor ax,ax
00000002  B046              mov al,0x46
00000004  31DB              xor bx,bx
00000006  31C9              xor cx,cx
00000008  CD80              int 0x80
0000000A  EB16              jmp short 0x22
0000000C  5B                pop bx
0000000D  31C0              xor ax,ax
0000000F  884307            mov [bp+di+0x7],al
00000012  895B08            mov [bp+di+0x8],bx
00000015  89430C            mov [bp+di+0xc],ax
00000018  B00B              mov al,0xb
0000001A  8D4B08            lea cx,[bp+di+0x8]
0000001D  8D530C            lea dx,[bp+di+0xc]
00000020  CD80              int 0x80
00000022  E8E5FF            call 0xa
00000025  FF                db 0xFF
00000026  FF2F              jmp far [bx]
00000028  62696E            bound bp,[bx+di+0x6e]
0000002B  2F                das
0000002C  7368              jnc 0x96
As you can see, all two byte words are reversed. 31c0 on disk becomes c031, and 46b0 becomes b046.

This is bad, because one of the exploitation techniques is, for example, to cat the shellcode from the disk into an environment variable and then retrieve the address of it, then overwrite a buffer and make it execute the code in the variable.

However, if the code is wrong in the environment variable, I can't really do that.

So I ask: What is causing this? Is this the kernel using some optimized memory management that wasn't in slack 11.0's default kernel, or is it the file system? I'm using ext3, by the way.

All help _greatly_ appreciated. I've just promised to hold a lecture on the subject in an irc channel I frequent, and I can't really do that if I can demonstrate the techniques.
Old 10-12-2007, 08:32 PM   #2
Simon Bridge
LQ Guru
Registered: Oct 2003
Location: Waiheke NZ
Distribution: Ubuntu
Posts: 9,211

Rep: Reputation: 198Reputation: 198
I've just promised to hold a lecture on the subject in an irc channel I frequent, and I can't really do that if I can demonstrate the techniques.
You can always install slack 11 and compare... your lecture shows that the technique used to work but not any more and why.
This is bad, because
You mean: this is good because a common and well-documented exploit has been blocked?

Presumably you can reverse the byte order in the command to compensate...

However - you'll see the reversal is not restricted to the 2-byte words. In fact each consecutive pair is reversed. Look:

c031 46b0 db31 c931 80cd 16eb 315b 88c0 0743 5b89 8908 0c43 0bb0 4b8d 8d08 0c53
31c0 b046 31db 31c9 cd80 eb16 5b 31c0 884307 895B08 89430c b00b 8d4b08 8d530c
regroup (compare with top):
31c0 b046 31db 31c9 cd80 eb16 5b31 c088 4307 895b 0889 430c b00b 8d4b 088d 530c

This a quirk of the representation ... the hex-dump representation does not list the bytes in the address order.

00 31
01 c0
02 b0
03 46
04 31
... etc.

remember that 00 is to the right, and the bytes are just a long row of 1's and 0's written as one number, like this: 3156b0c031, see?

When you dump that, you list the zeroth-order pair first: c031, then the first-order pair 46b0 ... etc. This gives you the reversal you see.

If you still don't get it - do it in binary: bit0 of the code is bit0 of byte0, bit8 of the code is bit0 of byte1, etc. It is written as one number, then divided up into 16-bit blocks for ease of reading. Then the hexdump just lists the blocks in order from lowest to highest.


buffer, overflow, stack

Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off

Similar Threads
Thread Thread Starter Forum Replies Last Post
Cacti measures - how may I change it? geraldomanaus Linux - Server 0 08-01-2007 11:45 AM
LXer: Point, click, root: System exploitation with open tools LXer Syndicated Linux News 0 09-20-2006 09:21 PM
addtl security measures slug420 Linux - Security 1 06-10-2005 06:45 PM
additional firewall measures Syncrm Linux - Networking 1 04-18-2002 10:09 AM
Measures for accident!? Rex_chaos Linux - General 1 09-25-2001 12:12 PM

All times are GMT -5. The time now is 03:56 AM.

Main Menu
Write for LQ is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration