Module 06 Mitigation Techniques Part1
Module 06 Mitigation Techniques Part1
Exploitation
SEC-300-01/CSI-301-02
Ali Hadi
@binaryz0ne
Exploit Mitigation
Preventing memory corruption techniques!!!
www.ashemery.com 3
Timeline of Mitigation Cited [1]
• Windows XP SP 2
– Stack/heap cookies, SafeSEH, Software/Hardware DEP
• Windows Vista
– Address Space Layout Randomization
www.ashemery.com 4
Visual Studio /GS Flag Cited [1]
Canary
Buffer[1024]
www.ashemery.com 5
Structured Exception Handling Cited [1]
Canary
Buffer[1024]
www.ashemery.com 6
Visual Studio /SafeSEH Cited [1]
www.ashemery.com 7
References
• Memory Corruption 101, NYU Poly, Dino Dai Zovi
• SEHOP, http://www.sysdream.com/articles/sehop_en.pdf
• Shellcode Storm, http://shell-storm.org/shellcode/
• Stack /GS, https://msdn.microsoft.com/en-
us/library/8dbf701c%28VS.80%29.aspx?f=255&MSPPError=-
2147217396
www.ashemery.com 8