作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2012, Vol. 38 ›› Issue (20): 5-8. doi: 10.3969/j.issn.1000-3428.2012.20.002

• 专栏 • 上一篇    下一篇

基于Windows的结构化异常处理漏洞利用技术

吴伟民,郭朝伟,黄志伟,苏 庆,陈秋伟   

  1. (广东工业大学计算机学院,广州 510006)
  • 收稿日期:2011-12-02 修回日期:2012-02-20 出版日期:2012-10-20 发布日期:2012-10-17
  • 作者简介:吴伟民(1956-),男,教授,主研方向:信息安全,数据结构,可视计算,虚拟机技术;郭朝伟,硕士研究生;黄志伟,本科生;苏 庆,讲师;陈秋伟,本科生

Vulnerability Exploitation Technology of Structured Exception Handling Based on Windows

WU Wei-min, GUO Chao-wei, HUANG Zhi-wei, SU Qing, CHEN Qiu-wei   

  1. (Faculty of Computer, Guangdong University of Technology, Guangzhou 510006, China)
  • Received:2011-12-02 Revised:2012-02-20 Online:2012-10-20 Published:2012-10-17

摘要:

论述基于Windows的结构化异常处理(SEH)及相关保护机制,从攻击者的角度总结SEH漏洞利用技术。利用堆地址或保护模块之外的地址覆盖SEH句柄指针,绕过SafeSEH机制,伪造SEH链,绕过SEHOP机制,并分析使程序执行流程定位到Shellcode的方法。实例验证了SEH漏洞利用技术的有效性。

关键词: 结构化异常处理, SafeSEH机制, SEHOP机制, 漏洞利用技术, Shellcode定位

Abstract:

This paper discusses the Structured Exception Handling(SEH) and related protection mechanism, from the perspective of attackers, summarizes the technology of SEH vulnerability exploitation. It uses heap addresses or addresses outside of protection modules to overwrite the pointer of SEH handles to bypass SafeSEH, and fakes SEH chain to bypass SEHOP. It analyzes some major methods of making program execution flow locate the Shellcode. Example verifies the effectiveness of the SHE vulnerability exploitation technology.

Key words: Structured Exception Handling(SEH), SafeSEH mechanism, SEHOP mechanism, vulnerability exploitation technology, Shellcode location

中图分类号: