The past, the present and the future of software exploitation techniques Nikita Tarakanov, Moscow, Russia ZeroNights st of November 2014
Agenda Introduction The past The present The (nearest) future Q&A
Introduction This talk is very high-level overview of past and present software exploitation techniques (and their first appearances) Mostly about memory corruptions and “binary” vulnerabilities The (nearest) future section is just thoughts of speaker
The past
Kick-off!!! 2 October 1988 Morris Worm Fingerd Sendmail Password bruting via rsh
fingerd stack-based buffer overflow Picture source:
November 08, 1996 (Phrack 49) Smashing The Stack For Fun And Profit
Bypassing the non-exec Stack (ret-2-libc) - 8/10/ Solar Designer
Bypassing the non-exec Stack (ret-2-libc)
1/31/ w00w00 on Heap Overflows
9/20/ Format String bug in proftpd
7/25/ JPEG Com Marker vulnerability in Netscape
9/9/ Format String Attacks
6/18/ IIS.ida ISAPI filter Vulnerability Remove this slide?
7/13/ Code Red Worm in the Wild Remove this slide?
11/8/2001 VUDO malloc tricks
11/8/2001 Once upon a free
2/7/ Third Generation Exploits flake/bh-europe-01-halvarflake-1.ppt
7/28/ Advances in Format String Exploitation
7/10/ "Variations in Exploit methods between Linux and Windows" litchfield-paper.pdf litchfield-paper.pdf
8/2/ “Win32 device drivers communication vulnerabilities” Arbitrary memory overwrite via ioctl METHOD_NEITHER
9/8/ "Defeating the Stack Based Buffer Overflow Prevention Mechanism of MS Windows 2003 Server" litchfield.pdf
9/30/ /SAFESEH introduced into Visual Studio Remove this slide?
4/21/2004 “Reliable Windows Heap Exploits”
7/28/2004 “Windows Heap Overflows” litchfield/bh-win-04-litchfield.ppt
10/25/ “On the effectiveness of ASLR”
"Heap Spraying" against Internet Explorer is demonstrated - 11/2/2004
1/21/ "Defeating Microsoft Windows XP SP2 Heap protection and DEP bypass" protection.pdf
2/17/ “Remote Windows Kernel Exploitation” Jack_White_Paper.pdf
7/20/ "Windows Kernel Pool Overflow Exploitation" BeIt.pdf
8/31/ “Critical Section Heap Exploit Technique” windows-heap-protections
10/5/ Technique published to bypass hardware DEP Uninformed Journal 2, Matt Miller (skape) and Ken Johnson (skywing) NtProtectVirtualMemory NtSetInformationProcess
11/30/ Microsoft ships Visual Studio 2005 with GS v2 Remove this slide?
12/7/ Technique published to exploit Freelist[0] on XP-SP2 oiting%20Freelist[0]%20On%20XP%20Service%20Pack%202.pdf
10/31/ "Memory Retrieval Vulnerabilities" Oct2006.pdf
1/19/ "Double Free Vulnerabilities" vulnerabilities-part-1
3/1/ "GS and ASLR in Windows Vista"
3/27/ "Heap Feng Shui in JavaScript" 07/Sotirov/Presentation/bh-eu-07-sotirov-apr19.pdf
7/6/ "Understanding and Bypassing Windows Heap Protection" 7.pdf
4/14/ "Application-Specific Attacks - Leveraging the ActionScript Virtual Machine" si/compsec_assign/Dowd2008.pdf
7/1/2008 "Real World Kernel Pool Exploitation"
7/29/2008.Net controls used to exploit IE 08/Sotirov_Dowd/bh08-sotirov-dowd.pdf
8/8/2008 "Attacking the Vista Heap" 08/Hawkes/BH_US_08_Hawkes_Attacking_Vista_Heap.ppt
2/3/ Pointer Inference and JIT Spray Paper.pdf
The present
Drive-By-Download attacks Heap manipulation Turning Memory Corruption to Information leakage (ASLR bypass) ROP
Privilege Escalation attacks Arbitrary memory overwrites Simple jump to shellcode located in r3 address space ROP (seen not a lot)
The future More chained exploits More “Inter-Ring” exploits Firmware/Hardware bugs
Thank you for listening! Any questions?