Ghidra Plugin Development for Vulnerability Research
https://www.somersetrecon.com/blog/2019/ghidra-plugin-development-for-vulnerability-research-part-1
@reverseengine
https://www.somersetrecon.com/blog/2019/ghidra-plugin-development-for-vulnerability-research-part-1
@reverseengine
Somerset Recon
Ghidra Plugin Development for Vulnerability Research - Part-1 — Somerset Recon
Overview On March 5th at the RSA security conference, the National Security Agency (NSA) released a reverse engineering tool called Ghidra. Similar to IDA Pro, Ghidra is a disassembler and decompiler with many powerful features (e.g., plugin support,…
❤1
User-Friendly Fuzzing with Sienna Locomotive
https://blog.trailofbits.com/2019/04/08/user-friendly-fuzzing-with-sienna-locomotive
@reverseengine
https://blog.trailofbits.com/2019/04/08/user-friendly-fuzzing-with-sienna-locomotive
@reverseengine
The Trail of Bits Blog
User-Friendly Fuzzing with Sienna Locomotive
Fuzzing is a great way to find bugs in software, but many developers don’t use it. We hope to change that today with the release of Sienna Locomotive, a new open-source fuzzer for Windows that emphasizes usability. Sienna Locomotive aims to make fuzzing accessible…
❤1
ROP Gadget
وقتی NX جلوی اجرای Shellcode رو گرفت اکسپلویترها فهمیدن یه چیز مهم وجود داره:
داخل هر برنامه و کتابخونه کلی کد آماده هست.
آیا میشه همین کدهای آماده رو به شکل دلخواه اجرا کرد؟
بله و به این میگن ROP
Gadget?
Gadget
یه تیکه کد خیلی کوچیکه که از قبل داخل باینری وجود داره اخرش معمولا ret داره
مثلا:
Copy code
یا:
Copy code
اینها به تنهایی کار بزرگی نمیکنن ولی وقتی پشت سر هم قرار بگیرن تبدیل میشن به یه برنامه کامل
چرا ret مهمه؟
چون ret ادرس بعدی رو از استک برمیداره و میره اجراش میکنه
یعنی اگر استک رو کنترل کنید میتونید تعیین کنی بعد از هر gadget کجا بره
در نتیجه:
RIP → gadget اول
ret → gadget دوم
ret → gadget سوم
و همینطور ادامه پیدا میکنه
CPU
عملاً داره برنامهای رو اجرا میکنه که شما از روی استک نوشتید
ROP Chain?
ROP Chain
یعنی یه لیست از آدرس gadget ها که روی استک میذارید
مثلا مفهومش اینه:
Copy code
یعنی:
مقدار ارگومان ست میشه بعد تابع اجرا میشه
بدون اینکه حتی یک بایت کد جدید اجرا کرده باشید
چرا ROP اینقدر قدرتمنده؟
چون:
NX رو دور میزنه
از کد trusted استفاده میکنه تقریبا روی هر برنامهای قابل انجامه پایهی خیلی از exploitهای واقعی دنیاست
بیشتر حملات مدرن عملا یه نوع ROP هستن
یک نکته خیلی مهم که تازه کارها نمیفهمن
ROP
یعنی کد ننویسید جریان اجرای CPU رو با قطعات آماده بسازید
شما دارید CPU رو گول میزنید که فکر کنه این مسیر طبیعی برنامست
ROP Gadget
When NX stopped Shellcode execution, the exploiters realized something important:
There is a whole bunch of ready-made code inside every program and library.
Can this ready-made code be executed in any way you want?
Yes, and this is called a ROP
Gadget?
Gadget
A very small piece of code that is already inside the binary, usually with ret at the end
For example:
Copy code
or:
Copy code
These don't do much on their own, but when they are put together, they become a complete program
Why is ret important?
Because ret takes the next address from the stack and executes it
That is, if you control the stack, you can determine where it goes after each gadget
As a result:
RIP → first gadget
ret → second gadget
ret → third gadget
And so on
The CPU
is actually executing the program that you wrote from the stack
ROP Chain?
ROP Chain
That is, a list of gadget addresses that you put on the stack
For example, its meaning is:
Copy code
That is:
The value of the argument is set, then the function is executed
Without you executing a single new byte of code
Why is ROP so powerful?
Because:
Bypasses NX
Uses trusted code Can be executed on almost any program Is the basis of many real world exploits
Most modern attacks are actually a type of ROP
A very important point that beginners don't understand
ROP
means don't write code Build the CPU execution flow with ready-made parts
You are tricking the CPU into thinking that this is the natural path of the program
@reverseengine
وقتی NX جلوی اجرای Shellcode رو گرفت اکسپلویترها فهمیدن یه چیز مهم وجود داره:
داخل هر برنامه و کتابخونه کلی کد آماده هست.
آیا میشه همین کدهای آماده رو به شکل دلخواه اجرا کرد؟
بله و به این میگن ROP
Gadget?
Gadget
یه تیکه کد خیلی کوچیکه که از قبل داخل باینری وجود داره اخرش معمولا ret داره
مثلا:
Copy code
pop rdi
ret
یا:
Copy code
mov rax, rdi
ret
اینها به تنهایی کار بزرگی نمیکنن ولی وقتی پشت سر هم قرار بگیرن تبدیل میشن به یه برنامه کامل
چرا ret مهمه؟
چون ret ادرس بعدی رو از استک برمیداره و میره اجراش میکنه
یعنی اگر استک رو کنترل کنید میتونید تعیین کنی بعد از هر gadget کجا بره
در نتیجه:
RIP → gadget اول
ret → gadget دوم
ret → gadget سوم
و همینطور ادامه پیدا میکنه
CPU
عملاً داره برنامهای رو اجرا میکنه که شما از روی استک نوشتید
ROP Chain?
ROP Chain
یعنی یه لیست از آدرس gadget ها که روی استک میذارید
مثلا مفهومش اینه:
Copy code
offset
addr(pop rdi)
value("/bin/sh")
addr(system)
یعنی:
مقدار ارگومان ست میشه بعد تابع اجرا میشه
بدون اینکه حتی یک بایت کد جدید اجرا کرده باشید
چرا ROP اینقدر قدرتمنده؟
چون:
NX رو دور میزنه
از کد trusted استفاده میکنه تقریبا روی هر برنامهای قابل انجامه پایهی خیلی از exploitهای واقعی دنیاست
بیشتر حملات مدرن عملا یه نوع ROP هستن
یک نکته خیلی مهم که تازه کارها نمیفهمن
ROP
یعنی کد ننویسید جریان اجرای CPU رو با قطعات آماده بسازید
شما دارید CPU رو گول میزنید که فکر کنه این مسیر طبیعی برنامست
ROP Gadget
When NX stopped Shellcode execution, the exploiters realized something important:
There is a whole bunch of ready-made code inside every program and library.
Can this ready-made code be executed in any way you want?
Yes, and this is called a ROP
Gadget?
Gadget
A very small piece of code that is already inside the binary, usually with ret at the end
For example:
Copy code
pop rdi
ret
or:
Copy code
mov rax, rdi
ret
These don't do much on their own, but when they are put together, they become a complete program
Why is ret important?
Because ret takes the next address from the stack and executes it
That is, if you control the stack, you can determine where it goes after each gadget
As a result:
RIP → first gadget
ret → second gadget
ret → third gadget
And so on
The CPU
is actually executing the program that you wrote from the stack
ROP Chain?
ROP Chain
That is, a list of gadget addresses that you put on the stack
For example, its meaning is:
Copy code
offset
addr(pop rdi)
value("/bin/sh")
addr(system)
That is:
The value of the argument is set, then the function is executed
Without you executing a single new byte of code
Why is ROP so powerful?
Because:
Bypasses NX
Uses trusted code Can be executed on almost any program Is the basis of many real world exploits
Most modern attacks are actually a type of ROP
A very important point that beginners don't understand
ROP
means don't write code Build the CPU execution flow with ready-made parts
You are tricking the CPU into thinking that this is the natural path of the program
@reverseengine
❤1
How to bypass Instagram SSL Pinning on Android (v78)
https://plainsec.org/how-to-bypass-instagram-ssl-pinning-on-android-v78
@reverseengine
https://plainsec.org/how-to-bypass-instagram-ssl-pinning-on-android-v78
@reverseengine
❤1
Heap Exploitation series:
Understanding the Glibc Heap:
Free, Bins, Tcache
https://azeria-labs.com/heap-exploitation-part-2-glibc-heap-free-bins
@reverseengine
Understanding the Glibc Heap:
Free, Bins, Tcache
https://azeria-labs.com/heap-exploitation-part-2-glibc-heap-free-bins
@reverseengine
Azeria-Labs
Heap Exploitation Part 2: Understanding the Glibc Heap Implementation
❤1
Generate DLL proxy/sideload projects. Automatically parses PE export tables and generates ready-to-compile project for red team engagements
https://github.com/Whitecat18/LazyDLLSideload
@reverseengine
https://github.com/Whitecat18/LazyDLLSideload
@reverseengine
GitHub
GitHub - Whitecat18/LazyDLLSideload: Generate DLL proxy/sideload projects. Automatically parses PE export tables and generates…
Generate DLL proxy/sideload projects. Automatically parses PE export tables and generates ready-to-compile project for red team engagements. - Whitecat18/LazyDLLSideload
❤1
Someone published the source code of the GAPZ bootkit:
Bootkit: https://github.com/Darkabode/zerokit
Usermode Part: https://github.com/Darkabode/possessor
Server Controller Part: https://github.com/Darkabode/0ctrl
Some shared Code: https://github.com/Darkabode/0lib
Analysis GAPZ Bootkit: https://www.welivesecurity.com/wp-content/uploads/2013/04/gapz-bootkit-whitepaper.pdf
@reverseengine
Bootkit: https://github.com/Darkabode/zerokit
Usermode Part: https://github.com/Darkabode/possessor
Server Controller Part: https://github.com/Darkabode/0ctrl
Some shared Code: https://github.com/Darkabode/0lib
Analysis GAPZ Bootkit: https://www.welivesecurity.com/wp-content/uploads/2013/04/gapz-bootkit-whitepaper.pdf
@reverseengine
GitHub
GitHub - Darkabode/zerokit: Zerokit/GAPZ rootkit (non buildable and only for researching)
Zerokit/GAPZ rootkit (non buildable and only for researching) - Darkabode/zerokit
❤1
Linux Kernel Exploitation
https://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x1-smashing.html?m=1
@reverseengine
https://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x1-smashing.html?m=1
@reverseengine
❤1
IDA Pro 9.2 Beta3 +Keygen
Win x64
Linux x64
Mac x64, arm
Download 2.4GB
Link1
Link2
Link3
magnet:?xt=urn:btih:ce86306a417dd64fab8d26a4983a58412008a9e&dn=ida92
@reverseengine
Win x64
Linux x64
Mac x64, arm
Download 2.4GB
Link1
Link2
Link3
magnet:?xt=urn:btih:ce86306a417dd64fab8d26a4983a58412008a9e&dn=ida92
@reverseengine
❤1
Hack-cessibility: When DLL Hijacks Meet Windows Helpers
https://trustedsec.com/blog/hack-cessibility-when-dll-hijacks-meet-windows-helpers
@reverseengine
https://trustedsec.com/blog/hack-cessibility-when-dll-hijacks-meet-windows-helpers
@reverseengine
TrustedSec
Hack-cessibility: When DLL Hijacks Meet Windows Helpers
❤2
The art of Breaking Through
https://0xdbgman.github.io/posts/sec-controls-the-art-of-breaking-through
@reverseengine
https://0xdbgman.github.io/posts/sec-controls-the-art-of-breaking-through
@reverseengine
DbgMan
Sec Controls: The Art of Breaking Through
The definitive red team guide to understanding and bypassing Windows security controls: Windows Defender (static + AMSI + behavioral), AppLocker, WDAC, SmartScreen, ASR Rules, Credential Guard (VBS/LSAIso), Sysmon, PPL, and a comprehensive EDR deep-dive covering…
❤2
EDR Killer
Exploits a vulnerability in the wsftprm.sys driver to disable antivirus and EDR
https://github.com/ThanniKudam/TopazTerminator
@reverseengine
Exploits a vulnerability in the wsftprm.sys driver to disable antivirus and EDR
https://github.com/ThanniKudam/TopazTerminator
@reverseengine
GitHub
GitHub - ThanniKudam/TopazTerminator: Just another EDR killer
Just another EDR killer. Contribute to ThanniKudam/TopazTerminator development by creating an account on GitHub.
❤3