Home »
» Cisco IOS Router Exploitation - The Return Address
Cisco IOS images are loaded similar to a regular
UNIX program in ELF format. When initialized, the
memory is separated into read-only sections for
program code and read-only data as well as readwrite sections for the data region and the common
heap. Ignoring other memory areas that are not
executable, such as the so-called IO-Memory, an
area dedicated to packet handling on the router, the
image's internal layout is the only deciding factor on
the resulting memory layout on the router.
This poses a tremendous challenge for the exploit
developer when control over the instruction pointer is
achieved: Where should it point to?
Since the stack of any IOS process is an arbitrarily
allocated block of memory on the heap, its location is
random enough to make it unpredictable.
Techniques like Heap spraying only apply to
situations where the attacker executes a large
amount of control over the target, which is clearly not
the case when attacking networking equipment. This
leaves only the class of “code reuse” methods, which
use existing code on the target to perform their initial
bootstrapping before running attacker provided code.
Related Posts:
Man in the middle attack (MITM): step by step guide
Man in the middle attack (MITM): step by step guide
atOptions = {
'key' : '33ea9ed70b11fbe3ee1a6089175c1b75',
'format' : 'iframe',
'height' : 250,
'width' : 300,
'params' : {}
};
document.write('');
… Read More
What Is Session Hijacking: Everything you need to know about
What Is Session Hijacking: Everything you need to know about
atOptions = {
'key' : '33ea9ed70b11fbe3ee1a6089175c1b75',
'format' : 'iframe',
'height' : 250,
'width' : 300,
'params' : {}
};
document.write… Read More
SQL injection: step-by-step guide
SQL injection: step-by-step guide
atOptions = {
'key' : '33ea9ed70b11fbe3ee1a6089175c1b75',
'format' : 'iframe',
'height' : 250,
'width' : 300,
'params' : {}
};
document.write('');
SQL injectionSQL i… Read More
Social Engineering: Everything you need to know.
Social Engineering: Everything you need to know.
atOptions = {
'key' : '33ea9ed70b11fbe3ee1a6089175c1b75',
'format' : 'iframe',
'height' : 250,
'width' : 300,
'params' : {}
};
document.write('');
Wha… Read More
What is cross site scripting (XSS) and how to fix it?
What is cross site scripting (XSS) and how to fix it?
atOptions = {
'key' : '33ea9ed70b11fbe3ee1a6089175c1b75',
'format' : 'iframe',
'height' : 250,
'width' : 300,
'params' : {}
};
document.write('');
… Read More
';
(function() {
var dsq = document.createElement('script'); dsq.type = 'text/javascript'; dsq.async = true;
dsq.src = '//' + disqus_shortname + '.disqus.com/embed.js';
(document.getElementsByTagName('head')[0] || document.getElementsByTagName('body')[0]).appendChild(dsq);
})();
';
(function() {
var dsq = document.createElement('script'); dsq.type = 'text/javascript'; dsq.async = true;
dsq.src = '//' + disqus_shortname + '.disqus.com/embed.js';
(document.getElementsByTagName('head')[0] || document.getElementsByTagName('body')[0]).appendChild(dsq);
})();
0 comments:
Post a Comment