Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Exploi'ng

 Simple  Buffer  Overflows  on  


Win32  

Vivek  Ramachandran  
SWSE,  SMFE,  SPSE,  SISE,  SLAE,  SGDE  Course  Instructor  

Cer'fica'ons:                          hNp://www.securitytube-­‐training.com    
 
Pentester  Academy:    hNp://www.PentesterAcademy.com    

©SecurityTube.net  
Bad  Characters  

©SecurityTube.net  
Bad  Characters  

•  Input  sent  to  the  program  is  filtered  

 
•  Input  Delimiters    
–  e.g.  0x00  for  a  string  
–  e.g.  0x0a  0x0d  for  HTTP  Header  fields    

•  Will  be  Applica'on  and  Developer  Logic  Specific  


   

©SecurityTube.net  
Why  should  this  bother  us?  

•  If  our  shellcode  contains  a  bad  character(s)  


then  it  will  break  the  exploit    

•  How  common  are  bad  characters?  VERY!!!  

©SecurityTube.net  
Generic  Bad  Character  Program  

©SecurityTube.net  
Pentester  Academy  

©SecurityTube.net  

You might also like