Author Login Editor-in-Chief Peer Review Editor Work Office Work

Computer Engineering ›› 2012, Vol. 38 ›› Issue (20): 5-8. doi: 10.3969/j.issn.1000-3428.2012.20.002

• Networks and Communications • Previous Articles     Next Articles

Vulnerability Exploitation Technology of Structured Exception Handling Based on Windows

WU Wei-min, GUO Chao-wei, HUANG Zhi-wei, SU Qing, CHEN Qiu-wei   

  1. (Faculty of Computer, Guangdong University of Technology, Guangzhou 510006, China)
  • Received:2011-12-02 Revised:2012-02-20 Online:2012-10-20 Published:2012-10-17

基于Windows的结构化异常处理漏洞利用技术

吴伟民,郭朝伟,黄志伟,苏 庆,陈秋伟   

  1. (广东工业大学计算机学院,广州 510006)
  • 作者简介:吴伟民(1956-),男,教授,主研方向:信息安全,数据结构,可视计算,虚拟机技术;郭朝伟,硕士研究生;黄志伟,本科生;苏 庆,讲师;陈秋伟,本科生

Abstract:

This paper discusses the Structured Exception Handling(SEH) and related protection mechanism, from the perspective of attackers, summarizes the technology of SEH vulnerability exploitation. It uses heap addresses or addresses outside of protection modules to overwrite the pointer of SEH handles to bypass SafeSEH, and fakes SEH chain to bypass SEHOP. It analyzes some major methods of making program execution flow locate the Shellcode. Example verifies the effectiveness of the SHE vulnerability exploitation technology.

Key words: Structured Exception Handling(SEH), SafeSEH mechanism, SEHOP mechanism, vulnerability exploitation technology, Shellcode location

摘要:

论述基于Windows的结构化异常处理(SEH)及相关保护机制,从攻击者的角度总结SEH漏洞利用技术。利用堆地址或保护模块之外的地址覆盖SEH句柄指针,绕过SafeSEH机制,伪造SEH链,绕过SEHOP机制,并分析使程序执行流程定位到Shellcode的方法。实例验证了SEH漏洞利用技术的有效性。

关键词: 结构化异常处理, SafeSEH机制, SEHOP机制, 漏洞利用技术, Shellcode定位

CLC Number: