12.07.2015 Views

Bug Hunter Diary

Bug Hunter Diary

Bug Hunter Diary

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6.2 Exploitation. ................................................ 1036.3 Vulnerability Remediation ....................................... 1106.4 Lessons Learned. ............................................. 1106.5 Addendum ................................................. 110Chapter 7: A <strong>Bug</strong> Older Than 4.4BSD 1137.1 Vulnerability Discovery ......................................... 114Step 1: List the IOCTLs of the Kernel ............................. 114Step 2: Identify the Input Data. ................................. 114Step 3: Trace the Input Data ................................... 1167.2 Exploitation. ................................................ 119Step 1: Trigger the <strong>Bug</strong> to Crash the System (Denial of Service) .......... 119Step 2: Prepare a Kernel-Debugging Environment .................... 121Step 3: Connect the Debugger to the Target System .................. 121Step 4: Get Control over EIP. .................................. 1237.3 Vulnerability Remediation ....................................... 1297.4 Lessons Learned. ............................................. 1307.5 Addendum ................................................. 130Chapter 8: The Ringtone Massacre 1338.1 Vulnerability Discovery ......................................... 133Step 1: Research the iPhone’s Audio Capabilities .................... 134Step 2: Build a Simple Fuzzer and Fuzz the Phone ................... 1348.2 Crash Analysis and Exploitation .................................. 1408.3 Vulnerability Remediation ....................................... 1478.4 Lessons Learned. ............................................. 1478.5 Addendum ................................................. 147Appendix A: Hints for Hunting 149A.1 Stack Buffer Overflows ......................................... 149Example: Stack Buffer Overflow Under Linux ....................... 151Example: Stack Buffer Overflow Under Windows .................... 152A.2 NULL Pointer Dereferences ...................................... 153A.3 Type Conversions in C ......................................... 154A.4 GOT Overwrites ............................................. 157Appendix B: Debugging 163B.1 The Solaris Modular Debugger (mdb) ............................... 163Starting and Stopping mdb ................................... 163General Commands ........................................ 164Breakpoints .............................................. 164Running the Debuggee. ...................................... 164Examining Data ........................................... 164Information Commands ...................................... 165Other Commands .......................................... 165Contents in Detailix

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!