in reply to Re: Finding stack addresses
in thread Finding stack addresses

ah yes, I'm sorry I didn't clarify. I'm using perl to exploit another c program that is vulnerable to buffer overflows. My perl program is just constructing the "egg" to feed into my vulnerable program and puts the exploit code into an environment variable. I'm trying to find the address of this variable so I can overflow the buffer in my vulnerable program with it. Thanks for your help!

Replies are listed 'Best First'.
Re^3: Finding stack addresses
by Joost (Canon) on Sep 18, 2006 at 21:07 UTC

      I could go into a lot of detail here, but I guess it would be mostly off-topic.

      However generally a successful buffer overflow attack requires two things:

      • A static buffer (keeping things simple) being overwritten such that a function return address on the stack can be modified.
      • A piece of shellcode somewhere in the processes address-space.

      Once you've written past the end of the buffer to be overflowed, and modified the saved "return address" value you want to write the address of your shellcode there. The net result is that once the buffer is overflown your own code gets executed, and you win!

      Traditionally this is done by saving the code to execute in an environmental variable - which will exist in all processes spawned by a parent shell, and which won't move around.

      So the process becomes:

      • run /bin/sh
      • setup the $EGG variable via "export EGG=shellcode..." (remember that environmental variables can contain binary data)
      • Construct an overly long argument/parameter/fileinputand feed it to your vulnerable program - attempting to cause the overritten return address/EIP to be set to getenv( "EGG")
      • Profit!

      Or you could cheat and use a pre-made tool to do all the work ..

      Steve
      --