The Presentation and Tutorial for Cross-Site Scripters Who Can't Stack Buffer Overflow Good and Want to Do Other Stuff Good Too
CrikeyCon 3, 2016-02-20
Did you miss out on stack-smashing for enjoyment and financial gain? Have you always meant to get in to "all that debugger stuff" but don't know your EIP from your ESP? Let's take it back to the 90s for an overview of Win32 stack buffer overflow exploitation.
We'll cover assembly, registers, the stack, function call and return mechanics, triggering stack buffer overflows, taking advantage of saved return pointer overwrites, generating shellcode, and some other weird tricks (software devs hate him!)
This is not new stuff, and modern mitigations (ASLR, DEP and stack canaries) totally harsh its mellow. If you're a stack savant who has a handle on the heap and ROPs relentlessly then I dunno go grab a beer or something.
tl;dr pop calc not alert(1)
dostackbufferoverflowgood
- Visual Studio solution fordostackbufferoverflow.exe
dostackbufferoverflowgood.exe
- Intentionally vulnerable binary, compiled without ASLR, DEP or Stack Canariesdostackbufferoverflowgood.pdb
- Debug symbols fordostackbufferoverflowgood.exe
dostackbufferoverflowgood_slides.pdf
- Presentation slidesdostackbufferoverflowgood_tutorial.pdf
- A tutorial fordostackbufferoverflowgood.exe
The code for dostackbufferoverflowgood.exe
is licensed under Apache License Version 2.0
Slides and tutorial are licensed under a Creative Commons Attribution 4.0 International License.