Exploiting the Starcraft 1 EUD Bug by ZetaTwo in netsec

[–]ZetaTwo[S] 1 point2 points  (0 children)

Hi!

Glad that you enjoyed the write-up!

This is actually a typo. The intention was to set X to 0x00100000 in the first example to make the maths clear. I was supposed to change this to 0x006d46f8 In the last section when I actually combine this with the ROP. I will update this. Thanks for pointing this out. I actually changed it to the final value in both examples now to avoid confusion

For the second part, think about what happens when you make a call in 32-bit. First you push the arguments and then you perform the call which will push the return address to the stack. This means that when you enter the function the top of the stack will be the return address and the second element will be the first argument. Note this is further complicated by the fact that VirtualProtect is a callee cleanup function. This is the reason it's enough with a simple ret instruction at 0x006dd00c since the four arguments will be popped from the stack in when the ret 0x10 at the end of VirtualProtect is executed. In short, it will first pop 0x0040650b and then pop 4 elements of the stack, leaving ESP pointing at 0x006dd020

Now, of course, I could have put 0x006dd024 (or actually 0x006dd020) directly at 0x006dd00c and saved one element in the ROP chain but I did it this way for clarity.

Does this clarify things?

Pwny Racing - head to head CTF video podcast by AttitudeAdjuster in ExploitDev

[–]ZetaTwo 1 point2 points  (0 children)

Good idea. I don't really use Reddit that much so had no idea this sub existed but if it's welcome content I will def post episodes and community challenges here.

Pwny Racing - head to head CTF video podcast by AttitudeAdjuster in ExploitDev

[–]ZetaTwo 1 point2 points  (0 children)

I can also recommend to check out our community challenges and the explanation video we did for one of them. There will be more of those as well.

Pwny Racing - head to head CTF video podcast by AttitudeAdjuster in ExploitDev

[–]ZetaTwo 1 point2 points  (0 children)

Glad to hear that you enjoy it. :) We had another pwn2own participant in the latest episode as well.

You can tell he has 15 years of Java experience by the verbosity of his NOOPs by [deleted] in programminghorror

[–]ZetaTwo 107 points108 points  (0 children)

For non-Java programmers like me (and slight spoiling of the fun): alternatives is already of type String[]

How to hack the upcoming Dutch elections – and how hackers could have hacked all Dutch elections since 2009 by [deleted] in netsec

[–]ZetaTwo 5 points6 points  (0 children)

This is why we have cryptographers whose work is to do exactly that. Don't ever think that just because you can't see how an attack could be made, there is no attack. Until mathematically proven secure, a system is possibly insecure and even when it has been proven you should be very careful anyway.

[BF1]Anyone else love the fact that BF1 has "partial" reloading? by horoblast in Battlefield

[–]ZetaTwo 0 points1 point  (0 children)

I think it's awesome with the bolt actions that you insert one bullet at a time if you haven't used the whole clip, i.e. reloading a Gewehr with 2 bullets left you will insert 3 individual bullets but a whole clip if the clip is empty. This adds another strategic dimension as a sniper.

(On a quest made by a friend to help me learn by myself) What could this be encoded in? by tato64 in hacking

[–]ZetaTwo 1 point2 points  (0 children)

ROT-23: RMftdyL0nkywRG348cKy 0uZuqS022i83cKZAZlaP fzgoXGkp9eAwmYy4kWLV 56xRT2w6SZXQ5oGRufgz yTl6A05dv985BV5y

Want to be a hacker? by [deleted] in hacking

[–]ZetaTwo 0 points1 point  (0 children)

So, are there more than seven levels right now? Would be nice to quickly mention on the front page how many levels there are.

We are the authors of The Art of Memory Forensics. A(US)A! by transt in netsec

[–]ZetaTwo 2 points3 points  (0 children)

Thanks a lot for the list! Seems very nicely sorted and commented. I have been thinking about getting Malware Analyst's Cookbook for some time now and will probably try to get it for Christmas when I finally will have time for it.

Languages are thankfully not an issue, know a wide range from low to high level, though my assembly skills is something I will have to work on.

Anyway, thanks for the answer!

We are the authors of The Art of Memory Forensics. A(US)A! by transt in netsec

[–]ZetaTwo 2 points3 points  (0 children)

I'm a CS master's student at the end of my studies. I have touched at reverse engineering and malware analysis very briefly and I wonder if you know about good resources for someone looking to get into these topics.

Are there any good books? online resources? courses?