This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
session:extra:preventing-vulnerabilities [2015/07/21 20:26] Razvan Deaconescu [Static Analysis with Cppcheck] |
session:extra:preventing-vulnerabilities [2020/07/19 12:49] (current) |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | = Session 13 | + | ====== 0x0D. Preventing Vulnerabilities ====== |
- | == Slides | + | ===== Slides |
<note warning> | <note warning> | ||
Line 7: | Line 7: | ||
</ | </ | ||
- | == Tutorials | + | ===== Tutorials |
- | === Sanitizing Input | + | ==== Sanitizing Input ==== |
Invalid input may cause a program to crash. Input may also consists of content that is able to exploit vulnerabilities in programs; among the most famous forms of input that causes exploits is [[https:// | Invalid input may cause a program to crash. Input may also consists of content that is able to exploit vulnerabilities in programs; among the most famous forms of input that causes exploits is [[https:// | ||
Line 18: | Line 18: | ||
Consider the case of a web application that receives HTTP queries. It may be that a form requires the user to input an alphanumeric character. The user, however, enters an binary shellcode string and then uses it to exploit a vulnerability in the web application and launch a shell or run a different command. A careful programmer would sanitize input and make sure the username is alphanumeric. Though it is possible to bypass this and use an [[http:// | Consider the case of a web application that receives HTTP queries. It may be that a form requires the user to input an alphanumeric character. The user, however, enters an binary shellcode string and then uses it to exploit a vulnerability in the web application and launch a shell or run a different command. A careful programmer would sanitize input and make sure the username is alphanumeric. Though it is possible to bypass this and use an [[http:// | ||
- | ==== Alphanumeric Shellcode | + | === Alphanumeric Shellcode |
An alphanumeric shellcode is a shellcode that consists solely of alphanumeric characters that may bypass a sanitizing method on a given string. Alphanumeric shellcodes have larger size due to the fact that they are only able to use certain instructions, | An alphanumeric shellcode is a shellcode that consists solely of alphanumeric characters that may bypass a sanitizing method on a given string. Alphanumeric shellcodes have larger size due to the fact that they are only able to use certain instructions, | ||
- | The Metasploit framework is among the simplest ways of obtaining shellcodes and alphanumeric shellcodes. | + | The Metasploit framework is among the simplest ways of obtaining shellcodes and alphanumeric shellcodes. Metasploit |
For example, in order to get an alphanumeric shellcode we would use [[https:// | For example, in order to get an alphanumeric shellcode we would use [[https:// | ||
The use of the '' | The use of the '' | ||
- | student@sss-vm:/ | + | student@sss-vm:/ |
MsfVenom - a Metasploit standalone payload generator. | MsfVenom - a Metasploit standalone payload generator. | ||
Also a replacement for msfpayload and msfencode. | Also a replacement for msfpayload and msfencode. | ||
Line 56: | Line 56: | ||
In order to list available payloads one would use the command< | In order to list available payloads one would use the command< | ||
- | student@sss-vm:/ | + | student@sss-vm:/ |
Framework Payloads (428 total) | Framework Payloads (428 total) | ||
Line 70: | Line 70: | ||
The complete command for creating an alphanumeric shellcode that spawns a shell:< | The complete command for creating an alphanumeric shellcode that spawns a shell:< | ||
- | student@sss-vm:/ | + | student@sss-vm:/ |
No platform was selected, choosing Msf:: | No platform was selected, choosing Msf:: | ||
No Arch selected, selecting Arch: x86 from the payload | No Arch selected, selecting Arch: x86 from the payload | ||
Line 81: | Line 81: | ||
buf += " | buf += " | ||
- | student@sss-vm:/ | + | student@sss-vm:/ |
No platform was selected, choosing Msf:: | No platform was selected, choosing Msf:: | ||
No Arch selected, selecting Arch: x86 from the payload | No Arch selected, selecting Arch: x86 from the payload | ||
Line 124: | Line 124: | ||
This is because these instructions need a way of computing the current position of the shellcode. This may be solved by making a register (such as ECX for example) point to the beginning of the shellcode buffer. If that is possible in the program, then the shellcode may be instructed to fetch its address from that point:< | This is because these instructions need a way of computing the current position of the shellcode. This may be solved by making a register (such as ECX for example) point to the beginning of the shellcode buffer. If that is possible in the program, then the shellcode may be instructed to fetch its address from that point:< | ||
- | student@sss-vm:/ | + | student@sss-vm:/ |
No platform was selected, choosing Msf:: | No platform was selected, choosing Msf:: | ||
No Arch selected, selecting Arch: x86 from the payload | No Arch selected, selecting Arch: x86 from the payload | ||
Line 160: | Line 160: | ||
IIIIIIIIIIIIIIIII7QZjAXP0A0AkAAQ2AB2BB0BBABXP8ABuJIazTKV8z9sb3VPh6MCSk9JGE8TobSqxGpPhdosRrI2NnikSaBKXTHWps0C0vO52pipnDoCCphgpRw63LIkQZmOpAA | IIIIIIIIIIIIIIIII7QZjAXP0A0AkAAQ2AB2BB0BBABXP8ABuJIazTKV8z9sb3VPh6MCSk9JGE8TobSqxGpPhdosRrI2NnikSaBKXTHWps0C0vO52pipnDoCCphgpRw63LIkQZmOpAA | ||
</ | </ | ||
- | === Detecting memory errors with Valgrind | + | ==== Detecting memory errors with Valgrind |
Valgrind is a multipurpose code profiling and memory debugging tool for Linux. It allows you to run your program in Valgrind' | Valgrind is a multipurpose code profiling and memory debugging tool for Linux. It allows you to run your program in Valgrind' | ||
- | ==== Running Valgrind memcheck | + | === Running Valgrind memcheck |
<code bash> | <code bash> | ||
Line 174: | Line 174: | ||
</ | </ | ||
- | ==== Interpreting errors | + | === Interpreting errors |
Memcheck issues a range of error messages. This section presents a quick summary of what error messages mean. The precise behaviour of the error-checking machinery is described [[http:// | Memcheck issues a range of error messages. This section presents a quick summary of what error messages mean. The precise behaviour of the error-checking machinery is described [[http:// | ||
- | ===== Illegal read / Illegal write errors | + | == Illegal read / Illegal write errors |
Take the following error: | Take the following error: | ||
Line 196: | Line 196: | ||
Note that Memcheck only tells you that your program is about to access memory at an illegal address. It can't stop the access from happening. So, if your program makes an access which normally would result in a segmentation fault, you program will still suffer the same fate -- but you will get a message from Memcheck immediately prior to this. In this particular example, reading junk on the stack is non-fatal, and the program stays alive. | Note that Memcheck only tells you that your program is about to access memory at an illegal address. It can't stop the access from happening. So, if your program makes an access which normally would result in a segmentation fault, you program will still suffer the same fate -- but you will get a message from Memcheck immediately prior to this. In this particular example, reading junk on the stack is non-fatal, and the program stays alive. | ||
- | ===== Use of uninitialised values | + | == Use of uninitialised values |
<code bash> | <code bash> | ||
Line 221: | Line 221: | ||
* The contents of heap blocks (allocated with malloc, new, or a similar function) before you (or a constructor) write something there. | * The contents of heap blocks (allocated with malloc, new, or a similar function) before you (or a constructor) write something there. | ||
- | ===== Use of uninitialised or unaddressable values in system calls | + | == Use of uninitialised or unaddressable values in system calls == |
Memcheck checks all parameters to system calls: | Memcheck checks all parameters to system calls: | ||
Line 259: | Line 259: | ||
The program has (a) written uninitialised junk from the heap block to the standard output, and (b) passed an uninitialised value to exit. Note that the first error refers to the memory pointed to by buf (not buf itself), but the second error refers directly to exit's argument arr2[0]. | The program has (a) written uninitialised junk from the heap block to the standard output, and (b) passed an uninitialised value to exit. Note that the first error refers to the memory pointed to by buf (not buf itself), but the second error refers directly to exit's argument arr2[0]. | ||
- | ===== Illegal frees | + | == Illegal frees == |
<code bash> | <code bash> | ||
Line 272: | Line 272: | ||
Memcheck keeps track of the blocks allocated by your program with malloc/new, so it can know exactly whether or not the argument to free/delete is legitimate or not. Here, this test program has freed the same block twice. As with the illegal read/write errors, Memcheck attempts to make sense of the address freed. If, as here, the address is one which has previously been freed, you wil be told that -- making duplicate frees of the same block easy to spot. You will also get this message if you try to free a pointer that doesn' | Memcheck keeps track of the blocks allocated by your program with malloc/new, so it can know exactly whether or not the argument to free/delete is legitimate or not. Here, this test program has freed the same block twice. As with the illegal read/write errors, Memcheck attempts to make sense of the address freed. If, as here, the address is one which has previously been freed, you wil be told that -- making duplicate frees of the same block easy to spot. You will also get this message if you try to free a pointer that doesn' | ||
- | ===== When a heap block is freed with an inappropriate deallocation function | + | == When a heap block is freed with an inappropriate deallocation function |
In the following example, a block allocated with new[] has wrongly been deallocated with free: | In the following example, a block allocated with new[] has wrongly been deallocated with free: | ||
Line 298: | Line 298: | ||
The reason behind the requirement is as follows. In some C++ implementations, | The reason behind the requirement is as follows. In some C++ implementations, | ||
- | ===== Overlapping source and destination blocks | + | == Overlapping source and destination blocks |
The following C library functions copy some data from one memory block to another (or something similar): memcpy, strcpy, strncpy, strcat, strncat. The blocks pointed to by their src and dst pointers aren't allowed to overlap. The POSIX standards have wording along the lines "If copying takes place between objects that overlap, the behavior is undefined." | The following C library functions copy some data from one memory block to another (or something similar): memcpy, strcpy, strncpy, strcat, strncat. The blocks pointed to by their src and dst pointers aren't allowed to overlap. The POSIX standards have wording along the lines "If copying takes place between objects that overlap, the behavior is undefined." | ||
Line 309: | Line 309: | ||
You don't want the two blocks to overlap because one of them could get partially overwritten by the copying. | You don't want the two blocks to overlap because one of them could get partially overwritten by the copying. | ||
- | ===== Memory leak detection | + | == Memory leak detection |
Memcheck keeps track of all heap blocks issued in response to calls to malloc/new et al. So when the program exits, it knows which blocks have not been freed. | Memcheck keeps track of all heap blocks issued in response to calls to malloc/new et al. So when the program exits, it knows which blocks have not been freed. | ||
Line 412: | Line 412: | ||
The first message describes a simple case of a single 8 byte block that has been definitely lost. The second case mentions another 8 byte block that has been definitely lost; the difference is that a further 80 bytes in other blocks are indirectly lost because of this lost block. The loss records are not presented in any notable order, so the loss record numbers aren't particularly meaningful. The loss record numbers can be used in the Valgrind gdbserver to list the addresses of the leaked blocks and/or give more details about how a block is still reachable. | The first message describes a simple case of a single 8 byte block that has been definitely lost. The second case mentions another 8 byte block that has been definitely lost; the difference is that a further 80 bytes in other blocks are indirectly lost because of this lost block. The loss records are not presented in any notable order, so the loss record numbers aren't particularly meaningful. The loss record numbers can be used in the Valgrind gdbserver to list the addresses of the leaked blocks and/or give more details about how a block is still reachable. | ||
- | === Static Analysis | + | ==== Static Analysis |
Static analysis can be done using a variety of tools, ranging from '' | Static analysis can be done using a variety of tools, ranging from '' | ||
Line 437: | Line 437: | ||
</ | </ | ||
- | < | + | < |
Another well know static analysis tool, used for detecting bugs and possible vulnerabilities is [[http:// | Another well know static analysis tool, used for detecting bugs and possible vulnerabilities is [[http:// | ||
- | == Tasks | + | ===== Tasks ===== |
- | === Valgrind warm-up exercise | + | ==== Valgrind warm-up exercise |
Download the following {{: | Download the following {{: | ||
- | === Hunting memory errors in Nginx | + | ==== Hunting memory errors in Nginx ==== |
Download the following {{: | Download the following {{: | ||
Line 471: | Line 471: | ||
As done in the previous exercise, try to pinpoint the memory problem using Valgrind and then resolve it. | As done in the previous exercise, try to pinpoint the memory problem using Valgrind and then resolve it. | ||
<note info>You may need to delve in a bit into the nginx code and understand how it's managing memory before attempting a fix </ | <note info>You may need to delve in a bit into the nginx code and understand how it's managing memory before attempting a fix </ | ||
- | === Shellcode, Sanitizing and Alphanumeric Shellcode | + | ==== Shellcode, Sanitizing and Alphanumeric Shellcode |
Use {{: | Use {{: | ||
Line 488: | Line 488: | ||
The shellcode will be passed as a byte array as an argument to the program. It will be stored in the '' | The shellcode will be passed as a byte array as an argument to the program. It will be stored in the '' | ||
</ | </ | ||
- | === Static Analysis with Cppcheck | + | ==== Static Analysis with Cppcheck |
Use {{: | Use {{: | ||
Line 494: | Line 494: | ||
Look through the source file. It consists of a function '' | Look through the source file. It consists of a function '' | ||
- | Write a library configuration file that specifies that '' | + | Write a library configuration file that specifies that '' |
Run '' | Run '' | ||
+ | |||
=== Extra: io.smashthestack.org === | === Extra: io.smashthestack.org === | ||
Go through the first 6 levels of the [[http:// | Go through the first 6 levels of the [[http:// | ||
- | + | ===== References | |
- | <note tip> | + | |
- | Pentru range construcția corectă este< | + | |
- | < | + | |
- | </ | + | |
- | Deși în manual este specificat ca< | + | |
- | < | + | |
- | </ | + | |
- | </ | + | |
- | == References | + | |
* [[http:// | * [[http:// |