git-svn-id: file:///home/svn/incoming/trunk@2444 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Matt Miller 2005-04-22 15:18:42 +00:00
parent 6db799663a
commit 714c71029c
1 changed files with 4 additions and 4 deletions

View File

@ -36,7 +36,7 @@ I. Introduction
ii. ADMmutate easily signatured by most NIDS (Snort, Fnord)
iii. Not considered very important to many researchers
d. NIDS deployments are playing chase the tail
i. The mouse always has the advantages; NIDS is reactive
i. The mouse always has the advantage; NIDS is reactive
ii. Advanced nops and encoders push NIDS to its limits
2. Exploitation
a. Techniques have become very mature
@ -127,7 +127,7 @@ III. Post-exploitation
b. Requires alternate approach
i. Hooking API routines not always possible -- symtab not
mapped into memory
ii. libc symbol version mismatches lead to linking nightmare
ii. libc symbol version mismatches lead to linking nightmares
c. Client-side relocations seem most feasible
i. Remote side maps a region of memory and sends the client
the base address
@ -309,7 +309,7 @@ IV. Payload Research
2. Uses a non-intrusive system call (NtDisplayString) to search validate
addresses
i. Same page walking logic as SEH is used
3. When the egg is found, jump ast the egg into the larger payload
3. When the egg is found, jump past the egg into the larger payload
3. One primary method of egghunting on Linux
a. System call
1. 30 bytes in size, searches for an 8 byte egg
@ -327,7 +327,7 @@ V. The Complete Picture - Metasploit 3.0
i. Bind handler
ii. Reverse handler
iii. Findsock handler
B. The power of exploitat generalization
B. The power of exploit generalization
1. Standardized exploit creation interface
i. Robust target definitions
ii. Detailed exploit implementation information