text stringlengths 0 1.99k |
|---|
(really?), let's just try to balance things a bit before it happens. |
|=---=[ How did Phrack influence you and helped shape who you are? |
A lot. Along with other zines, Phrack always stood out for its technical |
content. I remember studying all articles on heap exploitation (w00w00’s, |
MaXX’, the anonymous one) nergal’s article on ret2libc and klog’s on frame |
pointer overwrite, grugq’s ELF article, and his and scut’s on ELF |
encryption, and many more that I now recognize browsing the online issues. |
I used to print those articles and read them over and over. I even carried a |
few of the original printouts with me through many moves over the years. A |
few months ago, I found the stack and finally gave them a new life. |
Reading all the tricks, understanding all the different points of view, |
finally helped me develop the instinct that a bit is just a bit, and all the |
meaning is in the observer. |
And I figured I’m not a lonely weirdo who ENJOYS squeezing the constrained |
options a vulnerability offers to conquer the execution flow. We are legion. |
|=---=[ What is your favourite bug/exploit? |
I sadly forgot many, I feel the empty space in my memory. Let me try a few. |
== CVE-2004-0368 - dtlogin double free. |
Not the vulnerability, but the exploit. I was writing exploits for Core |
IMPACT, and need to get it to work always. It was tricky, because getting |
the double free to do a write-anything-anywhere depended on the heap state |
which has to be assumed dirty, though who used dtlogin? Target: Solaris |
running on SPARC. It was also a great time, because one of my friends-idols |
Halvar was in town visiting, and sitting in a crappy chair at Core, working |
on his bindiff, showing me early versions, and introducing me to yED (thanks |
for that!). So, I had the problem of getting a reliably heap exploit, and I |
started logging all traces (long life dtrace & truss), but it was impossible |
to follow in text, so I hacked a GUI to show heap movements (eventually |
released as HeapDraw / HeapTracer just when Alex Sotirov released his Heap |
Feng Shui with an obviously much trend name). Also found how to turn the |
double-free in an information leak, that allowed me to get pointers |
(read-anything primitive), to finally get a very reliable exploit. I |
remember how I enjoyed writing the exploit and the power that a new tool |
gave me, we needed lots more tools! Oh, wow, writing this I found a |
screenshot of HeapTracer showing dtlogin’s heap, I can’t believe how I |
remember the shape and what each block is. Yeah, this one definitely |
deserves a mention. |
== CVE-2001-0550 - wu-ftpd gobbing heap overflow (arbitrary free) |
Oh my god, that was a good one, the advisory even names Phrack 57! This time |
is the exploit, not the vuln Not my own exploit though. I had a quite |
reliable exploit, if I’m not inventing my memories, but it was |
irc.segfault.net golden times, and I was there with amazing people. |
That’s when I met MaXX, one of my favorite Phrack authors, who wrote on Vudu |
malloc tricks, but who clearly understood free() tricks too. We then worked |
together and are good friends, those were some of the best times. He showed |
me his wu-ftpd exploit (or maybe he took my unfinished crappy code and |
turned it into art?). |
Anyway, for it to work, you had to craft a globbing pattern (*.*) so when |
expanded you got an arbitrary free, and you could write what you wanted |
where you wanted. You could be lazy, like me, and bruteforce the right |
count ~{,,,,,,,,,...}, or you could really think about it (like he did, and |
just remembered now), and figure out that if you could do more than a single |
write and if you expressed the count in prime factors, you could have a |
really compact globbing pattern that got expanded to overwrite really large |
area. So yeah, he taught me art is a way of living, among many other things. |
== CVE-1999-1085 - SSH CRC32 compensation attack |
The original vulnerability (yes, I’m old, what can I remember if not old |
things?). The vulnerability is that, without knowing the cryptographic |
material, it’s possible to craft an ssh packet that will pass CRC32 |
validation in such a way that it allows a MitM to insert “keystrokes” in |
the ssh stream. It’s a quite complex (at the time) cryptographic attack |
that, with exploit in hand to demonstrate its power, forced all ssh |
implementations, in every device and distro, to be updated with our code, as |
we were starting to be known as Core SDI. Great score! |
== CVE-2001-0114 - SSH CRC32 compensation attack integer overflow |
Yes, almost the same name as the previous... It turned out that the final |
patch for CVE-1999-1085 had an integer overflow vulnerability, which was |
exploitable to get root access to any ssh server using the code. The exploit |
was assigned to me (I was assigned at the time :-p ) and it turned out to be |
really challenging. At some point you had to exploit the original |
vulnerability, luckily I had the original exploit from 1998 by Futo and Ek, |
so I didn’t have to break my head doing it. I got it working, and some time |
later I found another exploit in the wild (I knew it as x1), that was very |
similar (but previous apparently), and had a different solution to the |
original bug. My total admiration to whoever solved the CRC32 compensation |
to implement this other exploit. I remember I was really afraid we had |
inserted this bug in every device, and at the same time, I wished we did it |
on purpose. So I went down fishing the original email exchange to find that |
it was the original ssh team, when converting from ANSI types to their type |
notation, that inserted the bug, but we didn’t notice they had changed it. |
Or maybe we did but didn’t say? I don’t think so, I should remember! |
== BUGWEEK |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.