Payload Already Inside: Data Re-Use For Rop Exploits presented at HITBSecConf Malaysia 2010

by Long Le, Thanh Nguyen (VNSECURITY),

Tags: Exploitation

URL : http://conference.hackinthebox.org/hitbsecconf2010kul/?page_id=1036

Summary : Return-oriented programming (ROP) is one of the buzzing advanced exploitation techniques these days to bypass NX. There are several practical works using ROP techniques for exploitations on Windows, iPhoneOS to bypass DEP and code signing but no any practical ROP work for modern Linux distributions so far. Main issues for ROP exploitations on Linux x86 include ASCII-Armor address protection which maps libc address starting with NULL byte and Address Space Layout Randomization (ASLR).

In this presentation we will show how we can extend an old return-into-libc technique to a stage-0 loader that can bypass ASCII-Armor protection and make ROP on Linux x86 become a reality. In addition, by reusing not only codes but also data from the binary itself, we can build any chained ret2libc calls or ROP calls to bypass ASLR protection.