Download presentation
Presentation is loading. Please wait.
1
SUNY at Buffalo; Computer Science; CSE620 – Advanced Networking Concepts; Fall 2005; Instructor: Hung Q. Ngo 1 Agenda Last words on buffer overflows Overview of a few more techniques Defenses Attacks on network protocols
2
SUNY at Buffalo; Computer Science; CSE620 – Advanced Networking Concepts; Fall 2005; Instructor: Hung Q. Ngo 2 Stack-based overflow: more techniques Injected code can be in The overflowed buffer itself An environment variable Another buffer (which is not overflowed) Intrusion detection systems Check for non-ASCII bytes in buffers Attackers then use polymorphic shellcodes Non-executable stack “Return to libc” technique Point return address to, say, system(), execve() Feed system() with a string pointing to a shell
3
SUNY at Buffalo; Computer Science; CSE620 – Advanced Networking Concepts; Fall 2005; Instructor: Hung Q. Ngo 3 Other Overflow Attacks Heap and BSS overflow I need more time on this Use one dynamically allocated variable to overflow another This will change the way the program behaves Format string vulnerabilities Printf() … Off-by-one overflow
4
SUNY at Buffalo; Computer Science; CSE620 – Advanced Networking Concepts; Fall 2005; Instructor: Hung Q. Ngo 4 Buffer-overflow defenses Write correct code Code auditing (by humans) Static code analysis: quite effective Use fault-injection tools, Non-executable stack Array-bound checking (with compiler) Code pointer integrity checking StackShield, StackGuard, PointGuard Read Phrack Magazine 56 (5), May 2000
5
SUNY at Buffalo; Computer Science; CSE620 – Advanced Networking Concepts; Fall 2005; Instructor: Hung Q. Ngo 5 Other things Password cracking Dictionary attacks Exhaustive brute-force attacks Hash lookup tables Password probability matrix WEP attacks Offline brute-force attacks Keystream reuse IP redirection Fluhrer, Mantin, and Shamir (FMS) attack
6
SUNY at Buffalo; Computer Science; CSE620 – Advanced Networking Concepts; Fall 2005; Instructor: Hung Q. Ngo 6 Some network protocol attacks & techniques SYN-flooding TCP/IP Hijacking RST hijacking The ping of death Ping flooding, amplification attacks Port scanning Stealth SYN scan FIN, X-mas, Null scans Spoofing decoys Idle scanning IP Spoofing and defenses against it
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.