SlideShare a Scribd company logo
Techniques	&	Mi-ga-on	
	
Yaniv	Shani
What	is	Exploit?	
A	piece	of	so=ware	that	leverage	an	
applica-on	vulnerability	to	cause	
unintended	applica-on	behavior
Exploits	Techniques	
•  Stack	overflow	
•  SEH	frame	overwrite	
•  Heap	overflow	
•  Ret2LibC	
•  Return	Oriented	Programing		
•  JIT	Spraying	
•  Bypass	the	Sandbox	Model
Stack	overflow	
Overwrite	the	the	return	address	on	the	stack	with	a	
pointer	to	some	malicious	shell	code
SEH	Frame	overwrite	
Override	the	SEH	records	to	jump	to	the	shellcode
Heap	overflow	
•  Overwrite	the	allocated	buffer	internal		
linked	list	pointers.	
•  Use	the	resul=ng	pointer	exchange	to	
overwrite	program	counter.
•  Change	the	return	address	on	the	stack	to	
a	known	func=on	in	a	shared	library	
•  Doesn’t	include	shellcode	
Ret2LibC
Return	Oriented	Programing	
•  Form	Gadgets	by	combine	various	instruc-ons.	
•  Gadget	perform	high-level	ac-on	
•  i.e	VirtualAlloc(),	SetProcessDEPPolicy()
JIT	Spraying	
•  Make	use	of	the	fact	that	JIT	compiler	generated	
executable	code	at	run=me	
•  Spraying	NOP	slides,	XOR	and	shellcode	into	memory
Bypass	the	Sandbox	Model	
•  Bypass	the	security	mechanism	
•  Enable	untrusted	applica-on	an	access	to	
underlying	system	resources.
Mi-ga-on	techniques	
•  Stack	Protec-on	
•  SafeSEH	
•  Heap	Protec-on	
•  DEP			
•  ASLR
Stack	Protec-on	
•  Add	Canary	before	stack	return	pointer	
•  Check	Canary	&	terminate	on	mismatch
SafeSEH	
•  A	Link	=me	op=on	that	generate	a	table	with	
all	SEH	that	will	be	used	by	the	program
Heap	Protec-on	
•  Unlink	check	
•  Entry	header	cookie	
•  Pointer	encoding	
•  Randomized	meta	data	and	base	address
Data	Execu-on	Preven-on	
•  Preven=ng	applica=on	from	execu=ng	code	
from	non-executable	memory	region
Address	Space	Layout	Randomiza-on	
•  Randomly	arranging	the	posi=on	of	key	data	area	
(heap,	stack,	exec.	,	library	space).
Malware	Protec=on	Solu=on	
•  An=-Virus:	Black	list	of	file	signature.	
•  Only	effec=ve	against	known	threads	
•  Whitelis=ng	and	Sandboxing	solu=on	
•  Hard	to	implement		
•  Require	consistent	maintenance	
•  Stateful	applica=on	control	
•  Automated	malware	protec=on		
•  Protect	from	zero	day	aZack
Thank	You

More Related Content

PDF
Low Level Exploits
PDF
127 Ch 2: Stack overflows on Linux
PDF
CNIT 127: Ch 8: Windows overflows (Part 2)
PDF
CNIT 127: 4: Format string bugs
PDF
Perl Dist::Surveyor 2011
PDF
CNIT 127: Ch 8: Windows overflows (Part 1)
PDF
Introduce to Terraform
PDF
Tp install anything
Low Level Exploits
127 Ch 2: Stack overflows on Linux
CNIT 127: Ch 8: Windows overflows (Part 2)
CNIT 127: 4: Format string bugs
Perl Dist::Surveyor 2011
CNIT 127: Ch 8: Windows overflows (Part 1)
Introduce to Terraform
Tp install anything

What's hot (20)

PDF
CNIT 126 13: Data Encoding
PDF
[네이버오픈소스세미나] What’s new in Zipkin - Adrian Cole
PDF
Preview of Terraform 0.12 + modules.tf - Kiev HUG meetup
PDF
Internship final report@Treasure Data Inc.
PPTX
Terraform day1
PDF
0.5mln packets per second with Erlang
PDF
Smash the Stack: Writing a Buffer Overflow Exploit (Win32)
PDF
EKON 24 ML_community_edition
PDF
Reverse engineering - Shellcodes techniques
PDF
CNIT 126 5: IDA Pro
ODP
LD_PRELOAD Exploitation - DC9723
KEY
The Why and How of Scala at Twitter
PDF
Recursion & Erlang, FunctionalConf 14, Bangalore
PPTX
Flink history, roadmap and vision
PPTX
0.5mln packets per second with Erlang
PPTX
06 - ELF format, knowing your friend
PDF
Terraform modules and (some of) best practices
PDF
Make static instrumentation great again, High performance fuzzing for Windows...
PDF
Going FaaSter, Functions as a Service at Netflix
PPT
Buffer Overflows
CNIT 126 13: Data Encoding
[네이버오픈소스세미나] What’s new in Zipkin - Adrian Cole
Preview of Terraform 0.12 + modules.tf - Kiev HUG meetup
Internship final report@Treasure Data Inc.
Terraform day1
0.5mln packets per second with Erlang
Smash the Stack: Writing a Buffer Overflow Exploit (Win32)
EKON 24 ML_community_edition
Reverse engineering - Shellcodes techniques
CNIT 126 5: IDA Pro
LD_PRELOAD Exploitation - DC9723
The Why and How of Scala at Twitter
Recursion & Erlang, FunctionalConf 14, Bangalore
Flink history, roadmap and vision
0.5mln packets per second with Erlang
06 - ELF format, knowing your friend
Terraform modules and (some of) best practices
Make static instrumentation great again, High performance fuzzing for Windows...
Going FaaSter, Functions as a Service at Netflix
Buffer Overflows
Ad

Viewers also liked (20)

PPTX
Reversing & Malware Analysis Training Part 4 - Assembly Programming Basics
PDF
Smashing The Stack
PPTX
Introduction to Linux Exploit Development
PPT
Introduction to pointers and memory management in C
PPT
Debugging Applications with GNU Debugger
PPTX
How Functions Work
PDF
Insecure coding in C (and C++)
PDF
Ctf hello,world!
PDF
Basic of Exploitation
PPTX
Secure 360 adversary simulation
PDF
DbiFuzz framework #ZeroNights E.0x03 slides
PPT
Reliable Windows Heap Exploits
PDF
Exploit development 101 - Part 1 - Null Singapore
PPTX
Racing with Droids
PPTX
Power of linked list
PPTX
How2heap
PPTX
Tersine Mühendislik 101
PDF
Attacking the Webkit heap [Or how to write Safari exploits]
PPTX
How Safe is your Link ?
PPTX
You didnt see it’s coming? "Dawn of hardened Windows Kernel"
Reversing & Malware Analysis Training Part 4 - Assembly Programming Basics
Smashing The Stack
Introduction to Linux Exploit Development
Introduction to pointers and memory management in C
Debugging Applications with GNU Debugger
How Functions Work
Insecure coding in C (and C++)
Ctf hello,world!
Basic of Exploitation
Secure 360 adversary simulation
DbiFuzz framework #ZeroNights E.0x03 slides
Reliable Windows Heap Exploits
Exploit development 101 - Part 1 - Null Singapore
Racing with Droids
Power of linked list
How2heap
Tersine Mühendislik 101
Attacking the Webkit heap [Or how to write Safari exploits]
How Safe is your Link ?
You didnt see it’s coming? "Dawn of hardened Windows Kernel"
Ad

Similar to Exploit techniques and mitigation (20)

PPTX
Building a REST API Microservice for the DevNet API Scavenger Hunt
PDF
How to Reverse Engineer Web Applications
PPTX
Refactoring tools for Perl code
PDF
To ∞ (~65K) and beyond! - Sebastiano Gottardo - Codemotion Milan 2016
PDF
Reactive Cocoa Lightning Talk
PDF
Sitecore development approach evolution – destination helix
PPTX
Hyperloglog Lightning Talk
PDF
Cracking the code review at SpringIO 2024
PDF
Intro to CakePHP
PPTX
Testing Rapidly Changing Applications With Self-Testing Object-Oriented Selen...
PDF
Writing Code to Work Against any Salesforce Object
PDF
Apigility-powered API's on IBM i
PDF
Tool Up Your LAMP Stack
PDF
Tool up your lamp stack
PPTX
44CON 2014 - Pentesting NoSQL DB's Using NoSQL Exploitation Framework, Franci...
PDF
Jenkins vs. AWS CodePipeline (AWS User Group Berlin)
PPTX
Java Core | JavaFX 2.0: Great User Interfaces in Java | Simon Ritter
PPT
Code igniter overview
PDF
Cocoapods in action
PPTX
CT Software Developers Meetup: Using Docker and Vagrant Within A GitHub Pull ...
Building a REST API Microservice for the DevNet API Scavenger Hunt
How to Reverse Engineer Web Applications
Refactoring tools for Perl code
To ∞ (~65K) and beyond! - Sebastiano Gottardo - Codemotion Milan 2016
Reactive Cocoa Lightning Talk
Sitecore development approach evolution – destination helix
Hyperloglog Lightning Talk
Cracking the code review at SpringIO 2024
Intro to CakePHP
Testing Rapidly Changing Applications With Self-Testing Object-Oriented Selen...
Writing Code to Work Against any Salesforce Object
Apigility-powered API's on IBM i
Tool Up Your LAMP Stack
Tool up your lamp stack
44CON 2014 - Pentesting NoSQL DB's Using NoSQL Exploitation Framework, Franci...
Jenkins vs. AWS CodePipeline (AWS User Group Berlin)
Java Core | JavaFX 2.0: Great User Interfaces in Java | Simon Ritter
Code igniter overview
Cocoapods in action
CT Software Developers Meetup: Using Docker and Vagrant Within A GitHub Pull ...

Recently uploaded (20)

PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPT
tcp ip networks nd ip layering assotred slides
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
DOCX
Unit-3 cyber security network security of internet system
PPTX
E -tech empowerment technologies PowerPoint
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
Introduction to Information and Communication Technology
Cloud-Scale Log Monitoring _ Datadog.pdf
Paper PDF World Game (s) Great Redesign.pdf
introduction about ICD -10 & ICD-11 ppt.pptx
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
presentation_pfe-universite-molay-seltan.pptx
Design_with_Watersergyerge45hrbgre4top (1).ppt
tcp ip networks nd ip layering assotred slides
522797556-Unit-2-Temperature-measurement-1-1.pptx
Introuction about WHO-FIC in ICD-10.pptx
Module 1 - Cyber Law and Ethics 101.pptx
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
Job_Card_System_Styled_lorem_ipsum_.pptx
Unit-3 cyber security network security of internet system
E -tech empowerment technologies PowerPoint
RPKI Status Update, presented by Makito Lay at IDNOG 10
Slides PDF The World Game (s) Eco Economic Epochs.pdf
WebRTC in SignalWire - troubleshooting media negotiation
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Introduction to Information and Communication Technology

Exploit techniques and mitigation