SlideShare a Scribd company logo
Reversing Microsoft Patches to reveal Vulnerable codeHarsimranWaliahttp://null.co.in/http://nullcon.net/
nullcon 2011 - Reversing MicroSoft patches to reveal vulnerable code
http://null.co.in/http://nullcon.net/IntroductionFinding a 0day vulnerability Vulnerability reaches the vendorVendor finds a fixReleases a patch to fix the vulnerabilityMicrosoft patchesReverse engineer the patchLocate the vulnerability patchedHighlight the difficultiesBirth of a security patchDiscussion in the presentation
For reversing and obtaining binary difference in my demos I would be using DarunGrim2	How DarunGrim works?The schema of DarunGrim is shown in 	 the figureTo generate diffing resultsBinaries are disassembled in IDA Pro in the	background and darungrim IDA plugin is run	which creates the sqlite databaseDiffing Engine, the heart of DarunGrim2.	The sqlite db from IDA and the binaries from GUI	are fed into this engine as inputs http://null.co.in/http://nullcon.net/Introduction
 Algorithm ?Main algorithm of DarunGrim is Basic block fingerprint hash mapEach basic block is 1 entity whose fingerprint is generated from the instruction sequenceFingerprint hash generated by IDA ProTwo fingerprint hash tables one each for unpatched and patched binaryFor finding the binary difference, each unique fingerprint from original binary is searched against the fingerprints of patched binary for a matchAll fingerprints in the original binary hash tables are either matched or unmatchedhttp://null.co.in/http://nullcon.net/Introduction
 Algorithm ? Contd..For a function to be called matching, all the basic blocks in the function should be matchingFor unmatched functions DarunGrim calculates percentage matchMatch rate based on fingerprint string matchSimilar to GNU Diff algorithm which is finding longest common subsequencehttp://null.co.in/http://nullcon.net/Introduction
 Vulnerability Vs Exploit based signatures	Exploit signaturesCreated by using byte string patterns or regular expressions These are exploit specific They are used widely mainly because of the ease of their creationCater to only one type of input satisfying that vulnerability conditionFail: different attacks can exploit the same vulnerability, so exploit based signatures will fail For eg. Exploit based signatureESig = “docx?AAAAAAAAAAA...”It will fail if some exploit uses a long string of B’s instead of A’shttp://null.co.in/http://nullcon.net/Introduction
http://null.co.in/http://nullcon.net/Introduction Vulnerability Vs Exploit based signatures	Vulnerability signaturesBased on the properties of the vulnerability and not on the properties of the exploitIt is a superset of all the inputs satisfying a particular vulnerability conditionFor eg. Vulnerability based signature for previous caseVSig = MATCH_STR (Buffer,"docx?(.*)$",limit)Matches string in buffer with the regexIt is effective against any alphabet unlike exploit signatureVulnerabilitySignatureExploit Signature
 Vulnerability Vs Exploit based signatures	 Vulnerability signatures contd..For a good vulnerability signatureIt should strictly not allow any false negatives as even one exploit can pwn the system and create a gateway for the attacker into the network.It should allow very few false positives, as too many false positives may lead to a DoS attack for the system.The signature matching time should not create a considerable delay for the software and services.http://null.co.in/http://nullcon.net/Introduction
The first step of creating an undisclosed exploit is to find the vulnerability to exploit it.To verify if the patch released by Microsoft is working as per it is designed.To create vulnerability based signatures.http://null.co.in/http://nullcon.net/Need
http://null.co.in/http://nullcon.net/Process
http://null.co.in/http://nullcon.net/Finding patchesPick a vulnerability and download its patchPick a vulnerability just before this one that patched the same program or dllIf unavailable, use the same dll from your systemProcessQuick-fixUse open source ms-patch-tools to easily get the file versions to compareProblemGDR or QFE/LDR ??
FileVersioninghttp://null.co.in/http://nullcon.net/Finding patchesDEMOProcess
http://null.co.in/http://nullcon.net/Finding patchesExtraction of filesThe traditional way of extracting file from patch <patchfilename>.exe /xWorks only till Windows XP and earlier versions of WindowsProcessProblemAbove method cannot be used on Win7 and Vista patches delivered as msuhttp://null.co.in/http://nullcon.net/Finding patchesExtraction of filesSolutionProcessUse expand commandexpand -F:*  <Saved_MSU_File_Name>.msu C:\<Folder_to_extract_in> expand -F:*  <Saved_MSU_File_Name>.cab  C:\<Folder_to_extract_in>
http://null.co.in/http://nullcon.net/Finding patchesExtraction of filesDEMOProcess
Finding patcheshttp://null.co.in/http://nullcon.net/Extraction of filesBinary DifferencingDarunGrim v2 used for binary differenceFeed in the two binaries to be comparedGenerates a list of functions with the %age match between the two files ProcessProblemNot every function %age < 100 is changed
Includes false positives which requires manual analysisFinding patcheshttp://null.co.in/http://nullcon.net/Extraction of filesBinary DifferencingProcessDEMO
Finding patcheshttp://null.co.in/http://nullcon.net/Extraction of filesBinary DifferencingDifferencing AnalysisProcessManual inspection of functions with less than 100% matchRemove false positives generated by problems likeInstruction reorderingLot of reordering happening over different releases marks even the same blocks as unmatchedSplit blocksBlock in the graph which has only parent and the parent has only one child leads to a split block.causing a problem in the matching processCan be improved by merging the two blocks and treating as a single block.
http://null.co.in/http://nullcon.net/Finding patchesExtraction of filesBinary DifferencingDifferencing AnalysisProcessHot patchingInstructions like moveax, eax at the start of functions are a sign of hot patching leading to a mismatch in the blockBy just ignoring the instruction we can get a matchCompiler optimizations Different compilers and even different versions of the same compiler perform different optimizations which also creates problems in getting proper differenceEventually reach a function which is indeed modified and might be the fix to the vulnerability being patched
Finding patcheshttp://null.co.in/http://nullcon.net/Extraction of filesBinary DifferencingDifferencing AnalysisProcessDEMO
Finding patcheshttp://null.co.in/http://nullcon.net/Extraction of filesBinary DifferencingDifferencing AnalysisProcesspush 	[ebp-2Ch] 	  ; unsigned intcall 	??2@YAPAXI@Z    ; operator new(uint)mov  	ebx, eaxpop  	ecxmov  	[ebp-18h], ebxmov  	[ebp-3Ch], ebxmov  	byte ptr [ebp-4], 1push 	dwordptr [ebp-2Ch]mov  	ecx, esipush 	ebxpush    [ebp-30h]call    sub_118000C func(const *,void *,long)mov     edi, eaxtest    edi, edijge     short push    [ebp-2Ch] 	  ; unsigned intcall    ??2@YAPAXI@Z    ; operator new(uint)pop     ecxmov     [ebp-14h], eax ;  ebp-14h = pBuffermov     [ebp-40h], eaxmov     byte ptr [ebp-4], 2push    [ebp-2Ch]mov     ecx, esipush    ebxpush    edicall    sub_118000C func(const *,void *,long)mov     esi, eaxtest    esi, esijge     short loc_118158A
Finding patcheshttp://null.co.in/http://nullcon.net/Extraction of filesBinary DifferencingDifferencing AnalysisProcessDebuggingTo validate our finding of analysis by debuggingGetting a crash of the applicationCreating a malformed file to get the crashWould be using Immunity Debugger
Finding patcheshttp://null.co.in/http://nullcon.net/Extraction of filesBinary DifferencingDifferencing AnalysisProcessDebuggingDEMO
ConclusionPresented an overview of how the 1-day exploits and Vulnerability signatures can be createdAttempt was made to understand the process involved in reversing and the problems faced during the execution of the processOnly talked about Microsoft patches but concept not limited to this.Concepts presented can be perfected by interested audience http://null.co.in/http://nullcon.net/
ThanksQuestions??http://null.co.in/http://nullcon.net/
nullcon 2011 - Reversing MicroSoft patches to reveal vulnerable code

More Related Content

PPTX
C#Web Sec Oct27 2010 Final
PPTX
C# Security Testing and Debugging
PPT
Secure Ftp Java Style Rev004
PPT
Adobe Flex4
PPT
Intro Java Rev010
PDF
We continue checking Microsoft projects: analysis of PowerShell
PDF
War of the Machines: PVS-Studio vs. TensorFlow
PPT
Stopping the Rot - Putting Legacy C++ Under Test
C#Web Sec Oct27 2010 Final
C# Security Testing and Debugging
Secure Ftp Java Style Rev004
Adobe Flex4
Intro Java Rev010
We continue checking Microsoft projects: analysis of PowerShell
War of the Machines: PVS-Studio vs. TensorFlow
Stopping the Rot - Putting Legacy C++ Under Test

What's hot (20)

PDF
We Continue Exploring Tizen: C# Components Proved to be of High Quality
PDF
Testing Legacy Rails Apps
ODP
Mastering Mock Objects - Advanced Unit Testing for Java
PPTX
TDD and the Legacy Code Black Hole
KEY
iOS Unit Testing
PDF
New Year PVS-Studio 6.00 Release: Scanning Roslyn
PPTX
Applying TDD to Legacy Code
PDF
Unit Testing 101
PPTX
PVS-Studio and static code analysis technique
PDF
Living With Legacy Code
PDF
Write readable tests
PPT
Unit Testing in iOS
PPTX
TDD with Visual Studio 2010
PDF
The why and how of moving to php 8
PPTX
Unit Testing Android Applications
PDF
Java bad coding practices
PPT
Presentation_C++UnitTest
PPTX
Exception handling in ASP .NET
PPT
JMockit
We Continue Exploring Tizen: C# Components Proved to be of High Quality
Testing Legacy Rails Apps
Mastering Mock Objects - Advanced Unit Testing for Java
TDD and the Legacy Code Black Hole
iOS Unit Testing
New Year PVS-Studio 6.00 Release: Scanning Roslyn
Applying TDD to Legacy Code
Unit Testing 101
PVS-Studio and static code analysis technique
Living With Legacy Code
Write readable tests
Unit Testing in iOS
TDD with Visual Studio 2010
The why and how of moving to php 8
Unit Testing Android Applications
Java bad coding practices
Presentation_C++UnitTest
Exception handling in ASP .NET
JMockit
Ad

Similar to nullcon 2011 - Reversing MicroSoft patches to reveal vulnerable code (20)

PPTX
Reversing Microsoft patches to reveal vulnerable code
PDF
nullcon 2011 - Reversing MicroSoft patches to reveal vulnerable code
PPT
.NET Debugging Tips and Techniques
PPT
.Net Debugging Techniques
DOCX
Srgoc dotnet
DOCX
C# tutorial
PDF
Writing simple buffer_overflow_exploits
ODP
2600 av evasion_deuce
PPTX
IDAPRO
PPTX
Role of .NET in Exception Handling
DOC
Exploit Frameworks
PPTX
Production Debugging at Code Camp Philly
PDF
What's the Difference Between Static Analysis and Compiler Warnings?
PPT
SMI - Introduction to Java
ODP
Jbossworld Presentation
PPT
香港六合彩 &raquo; SlideShare
PDF
PVS-Studio in the Clouds: Azure DevOps
PPTX
Introductiontoasp netwindbgdebugging-100506045407-phpapp01
PPT
Bb Tequila Coding Style (Draft)
DOCX
MCS,BCS-7(A,B) Visual programming Syllabus for Final exams @ ISP
Reversing Microsoft patches to reveal vulnerable code
nullcon 2011 - Reversing MicroSoft patches to reveal vulnerable code
.NET Debugging Tips and Techniques
.Net Debugging Techniques
Srgoc dotnet
C# tutorial
Writing simple buffer_overflow_exploits
2600 av evasion_deuce
IDAPRO
Role of .NET in Exception Handling
Exploit Frameworks
Production Debugging at Code Camp Philly
What's the Difference Between Static Analysis and Compiler Warnings?
SMI - Introduction to Java
Jbossworld Presentation
香港六合彩 &raquo; SlideShare
PVS-Studio in the Clouds: Azure DevOps
Introductiontoasp netwindbgdebugging-100506045407-phpapp01
Bb Tequila Coding Style (Draft)
MCS,BCS-7(A,B) Visual programming Syllabus for Final exams @ ISP
Ad

More from n|u - The Open Security Community (20)

PDF
Hardware security testing 101 (Null - Delhi Chapter)
PPTX
SSRF exploit the trust relationship
PDF
PDF
Api security-testing
PDF
Introduction to TLS 1.3
PDF
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
PDF
Talking About SSRF,CRLF
PPTX
Building active directory lab for red teaming
PPTX
Owning a company through their logs
PPTX
Introduction to shodan
PDF
Detecting persistence in windows
PPTX
Frida - Objection Tool Usage
PDF
OSQuery - Monitoring System Process
PDF
DevSecOps Jenkins Pipeline -Security
PDF
Extensible markup language attacks
PPTX
PDF
Hardware security testing 101 (Null - Delhi Chapter)
SSRF exploit the trust relationship
Api security-testing
Introduction to TLS 1.3
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Talking About SSRF,CRLF
Building active directory lab for red teaming
Owning a company through their logs
Introduction to shodan
Detecting persistence in windows
Frida - Objection Tool Usage
OSQuery - Monitoring System Process
DevSecOps Jenkins Pipeline -Security
Extensible markup language attacks

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Approach and Philosophy of On baking technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
KodekX | Application Modernization Development
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPT
Teaching material agriculture food technology
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Cloud computing and distributed systems.
PDF
cuic standard and advanced reporting.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
Building Integrated photovoltaic BIPV_UPV.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
The AUB Centre for AI in Media Proposal.docx
Approach and Philosophy of On baking technology
Chapter 3 Spatial Domain Image Processing.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
“AI and Expert System Decision Support & Business Intelligence Systems”
KodekX | Application Modernization Development
Digital-Transformation-Roadmap-for-Companies.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Teaching material agriculture food technology
Machine learning based COVID-19 study performance prediction
Cloud computing and distributed systems.
cuic standard and advanced reporting.pdf
Per capita expenditure prediction using model stacking based on satellite ima...

nullcon 2011 - Reversing MicroSoft patches to reveal vulnerable code

  • 1. Reversing Microsoft Patches to reveal Vulnerable codeHarsimranWaliahttp://null.co.in/http://nullcon.net/
  • 3. http://null.co.in/http://nullcon.net/IntroductionFinding a 0day vulnerability Vulnerability reaches the vendorVendor finds a fixReleases a patch to fix the vulnerabilityMicrosoft patchesReverse engineer the patchLocate the vulnerability patchedHighlight the difficultiesBirth of a security patchDiscussion in the presentation
  • 4. For reversing and obtaining binary difference in my demos I would be using DarunGrim2 How DarunGrim works?The schema of DarunGrim is shown in the figureTo generate diffing resultsBinaries are disassembled in IDA Pro in the background and darungrim IDA plugin is run which creates the sqlite databaseDiffing Engine, the heart of DarunGrim2. The sqlite db from IDA and the binaries from GUI are fed into this engine as inputs http://null.co.in/http://nullcon.net/Introduction
  • 5. Algorithm ?Main algorithm of DarunGrim is Basic block fingerprint hash mapEach basic block is 1 entity whose fingerprint is generated from the instruction sequenceFingerprint hash generated by IDA ProTwo fingerprint hash tables one each for unpatched and patched binaryFor finding the binary difference, each unique fingerprint from original binary is searched against the fingerprints of patched binary for a matchAll fingerprints in the original binary hash tables are either matched or unmatchedhttp://null.co.in/http://nullcon.net/Introduction
  • 6. Algorithm ? Contd..For a function to be called matching, all the basic blocks in the function should be matchingFor unmatched functions DarunGrim calculates percentage matchMatch rate based on fingerprint string matchSimilar to GNU Diff algorithm which is finding longest common subsequencehttp://null.co.in/http://nullcon.net/Introduction
  • 7. Vulnerability Vs Exploit based signatures Exploit signaturesCreated by using byte string patterns or regular expressions These are exploit specific They are used widely mainly because of the ease of their creationCater to only one type of input satisfying that vulnerability conditionFail: different attacks can exploit the same vulnerability, so exploit based signatures will fail For eg. Exploit based signatureESig = “docx?AAAAAAAAAAA...”It will fail if some exploit uses a long string of B’s instead of A’shttp://null.co.in/http://nullcon.net/Introduction
  • 8. http://null.co.in/http://nullcon.net/Introduction Vulnerability Vs Exploit based signatures Vulnerability signaturesBased on the properties of the vulnerability and not on the properties of the exploitIt is a superset of all the inputs satisfying a particular vulnerability conditionFor eg. Vulnerability based signature for previous caseVSig = MATCH_STR (Buffer,"docx?(.*)$",limit)Matches string in buffer with the regexIt is effective against any alphabet unlike exploit signatureVulnerabilitySignatureExploit Signature
  • 9. Vulnerability Vs Exploit based signatures Vulnerability signatures contd..For a good vulnerability signatureIt should strictly not allow any false negatives as even one exploit can pwn the system and create a gateway for the attacker into the network.It should allow very few false positives, as too many false positives may lead to a DoS attack for the system.The signature matching time should not create a considerable delay for the software and services.http://null.co.in/http://nullcon.net/Introduction
  • 10. The first step of creating an undisclosed exploit is to find the vulnerability to exploit it.To verify if the patch released by Microsoft is working as per it is designed.To create vulnerability based signatures.http://null.co.in/http://nullcon.net/Need
  • 12. http://null.co.in/http://nullcon.net/Finding patchesPick a vulnerability and download its patchPick a vulnerability just before this one that patched the same program or dllIf unavailable, use the same dll from your systemProcessQuick-fixUse open source ms-patch-tools to easily get the file versions to compareProblemGDR or QFE/LDR ??
  • 14. http://null.co.in/http://nullcon.net/Finding patchesExtraction of filesThe traditional way of extracting file from patch <patchfilename>.exe /xWorks only till Windows XP and earlier versions of WindowsProcessProblemAbove method cannot be used on Win7 and Vista patches delivered as msuhttp://null.co.in/http://nullcon.net/Finding patchesExtraction of filesSolutionProcessUse expand commandexpand -F:* <Saved_MSU_File_Name>.msu C:\<Folder_to_extract_in> expand -F:* <Saved_MSU_File_Name>.cab C:\<Folder_to_extract_in>
  • 16. Finding patcheshttp://null.co.in/http://nullcon.net/Extraction of filesBinary DifferencingDarunGrim v2 used for binary differenceFeed in the two binaries to be comparedGenerates a list of functions with the %age match between the two files ProcessProblemNot every function %age < 100 is changed
  • 17. Includes false positives which requires manual analysisFinding patcheshttp://null.co.in/http://nullcon.net/Extraction of filesBinary DifferencingProcessDEMO
  • 18. Finding patcheshttp://null.co.in/http://nullcon.net/Extraction of filesBinary DifferencingDifferencing AnalysisProcessManual inspection of functions with less than 100% matchRemove false positives generated by problems likeInstruction reorderingLot of reordering happening over different releases marks even the same blocks as unmatchedSplit blocksBlock in the graph which has only parent and the parent has only one child leads to a split block.causing a problem in the matching processCan be improved by merging the two blocks and treating as a single block.
  • 19. http://null.co.in/http://nullcon.net/Finding patchesExtraction of filesBinary DifferencingDifferencing AnalysisProcessHot patchingInstructions like moveax, eax at the start of functions are a sign of hot patching leading to a mismatch in the blockBy just ignoring the instruction we can get a matchCompiler optimizations Different compilers and even different versions of the same compiler perform different optimizations which also creates problems in getting proper differenceEventually reach a function which is indeed modified and might be the fix to the vulnerability being patched
  • 20. Finding patcheshttp://null.co.in/http://nullcon.net/Extraction of filesBinary DifferencingDifferencing AnalysisProcessDEMO
  • 21. Finding patcheshttp://null.co.in/http://nullcon.net/Extraction of filesBinary DifferencingDifferencing AnalysisProcesspush  [ebp-2Ch]  ; unsigned intcall  ??2@YAPAXI@Z    ; operator new(uint)mov   ebx, eaxpop   ecxmov   [ebp-18h], ebxmov   [ebp-3Ch], ebxmov   byte ptr [ebp-4], 1push  dwordptr [ebp-2Ch]mov   ecx, esipush  ebxpush    [ebp-30h]call    sub_118000C func(const *,void *,long)mov     edi, eaxtest    edi, edijge     short push    [ebp-2Ch]  ; unsigned intcall    ??2@YAPAXI@Z    ; operator new(uint)pop     ecxmov     [ebp-14h], eax ;  ebp-14h = pBuffermov     [ebp-40h], eaxmov     byte ptr [ebp-4], 2push    [ebp-2Ch]mov     ecx, esipush    ebxpush    edicall    sub_118000C func(const *,void *,long)mov     esi, eaxtest    esi, esijge     short loc_118158A
  • 22. Finding patcheshttp://null.co.in/http://nullcon.net/Extraction of filesBinary DifferencingDifferencing AnalysisProcessDebuggingTo validate our finding of analysis by debuggingGetting a crash of the applicationCreating a malformed file to get the crashWould be using Immunity Debugger
  • 23. Finding patcheshttp://null.co.in/http://nullcon.net/Extraction of filesBinary DifferencingDifferencing AnalysisProcessDebuggingDEMO
  • 24. ConclusionPresented an overview of how the 1-day exploits and Vulnerability signatures can be createdAttempt was made to understand the process involved in reversing and the problems faced during the execution of the processOnly talked about Microsoft patches but concept not limited to this.Concepts presented can be perfected by interested audience http://null.co.in/http://nullcon.net/