SlideShare a Scribd company logo
HATSECURE TRAINING
#SESSION-1
ADVANCED
EXPLOIT DEVELOPMENT
Danang Heriyadi
danang@hatsecure.com
Copyright By Hatsecure Advanced Exploit Development
Disclaimer
Dilarang merubah isi modul dan menggandakan
modul ini tanpa seijin penulis
Copyright By Hatsecure
Copyright By Hatsecure Advanced Exploit Development
Table of Contents
Introduction......................................................................................................... 1
0x01 Classic stack overflow....................................................................... 2
Objective................................................................................................ 2
Overview.................................................................................................... 2
Exercise....................................................................................................... 2
Free float FTP Vulnerability................................................................... 3
Fuzzing : Crash the service............................................................... 3
Fuzzing : Finding the Right Offset to EIP.......................................... 3
Controlling the EIP........................................................................... 3
Take over the victim.......................................................................... 3
Conclusion.............................................................................................. 3
0x02 Bypassing Structured Exception Handling.................................. 3
Objective................................................................................................ 3
Overview........................................................................................... 3
Structured Exception Handling......................................................... 3
SEH / Safe SEH Bypassing Theory.................................................... 3
Testing SEH / SafeSEH protection.................................................... 3
Exercise............................................................................................. 3
All Media Server Vulnerability................................................................ 3
Module intruction mapping................................................................ 3
Returning into our shellcode............................................................. 3
Conclusion.............................................................................................. 3
0x03 Bypassing Data Exception Prevention.......................................... 3
Objective................................................................................................ 3
Overview........................................................................................... 3
Copyright By Hatsecure Advanced Exploit Development
Data Exception Prevention................................................................ 3
DEP Bypassing theory....................................................................... 3
Testing DEP Protection..................................................................... 3
Case Of study : Sami FTP Vulnerability................................................. 3
Return Oriented Programming.......................................................... 3
Defeating DEP with ROP.................................................................. 3
Returning into our shellcode............................................................. 3
Conclusion.............................................................................................. 3
0x03 Bypassing ASLR in windows 7......................................................... 3
Objective................................................................................................ 3
Overview........................................................................................... 3
Address Space Layout Randomization.............................................. 3
ASLR bypass theory.......................................................................... 3
0x04 Heap Memory Exploitation............................................................... 3
Objective................................................................................................ 3
Overview........................................................................................... 3
Heap Memory Layout........................................................................ 3
Case Of Study : Heap Spraying Internet Explorer................................. 3
Heap Spray Technique....................................................................... 3
Triggering Vulnerability..................................................................... 3
Returning into heap buffer................................................................ 3
Conclusion.............................................................................................. 3
0x05 Metasploit Module Development................................................... 3
Objective................................................................................................ 3
Overview........................................................................................... 3
Convert your exploit to metasploit module...................................... 3
Copyright By Hatsecure Advanced Exploit Development
0x06 Shellcode Development..................................................................... 3
Objective................................................................................................ 3
Overview........................................................................................... 3
Software Required............................................................................ 3
Windows API.................................................................................... 3
Static Shellcode Writing......................................................................... 3
Message Box..................................................................................... 3
Windows Execute............................................................................. 3
Combination shellcode...................................................................... 3
Convert your shellcode to metasploit module................................. 3
Shellcode Injection with metasploit....................................................... 3
Reporting................................................................................................ 3
Copyright By Hatsecure Advanced Exploit Development
Introduction
Exploit adalah suatu script yang menyerang melalui celah keamanan komputer
secara spesifik. Dalam exploit terkadang ditemukan suatu shellcode, shellcode
inilah yang menjadi suatu amunisi dari tool exploit.
Tool exploit bukan hal yang asing oleh seseorang yang menjadi praktisi
keamanan. Tool ini bisa digunakan untuk menguji keamanan secara legal.
Pada training “advanced exploit development” ini kita akan membahas dan
mengupas bagaimana seorang praktisi keamanan mencari celah keamanan,
membuat dan mengembangkan exploit.
Copyright By Hatsecure Advanced Exploit Development
0x01 Classic Stack Overflow
Objective
• Memahami konsep stack overflow
• Memahami metode debugging
• Memahami metode fuzzing atau fuzz testing
• Mampu mengeksploitasi celah stack overflow
Overview
Celah basis stack overflow terjadi ketika software melakukan penulisan data
melebihi kapasitas buffer. Sehingga data yang melebihi tersebut akan merubah
nilai yang ada dalam register memory.
Contoh source code yang memiliki celah stack overflow :
Source code diatas ketika kita kompilasi dan eksekusi.Kita hanya dapat mengisi
data maksimal 20 karakter dan apabila lebih dari 20 karakter, data yang kita
masukkan akan merubah nilai yang ada dalam register memory.
Exercise
Cobalah untuk mengulang hingga memahami konsep dan eksploitasi stack
overflow
Copyright By Hatsecure Advanced Exploit Development
#include <stdio.h>
int main(){
char data[20];
printf(“Masukkan data : “);
gets(data);
return 0;
}

More Related Content

PDF
Linux 101-hacks
PDF
Cisco routers for the small business a practical guide for it professionals...
PDF
Black_Hat_Python_Python_Programming_for_Hackers_and_Pentesters.pdf
PDF
Sqlmap readme
PDF
Crypto101
PDF
Www.dedoimedo.com crash-book
PDF
digital marketing training in bangalore
PDF
Dgs3612 g cli_dna
Linux 101-hacks
Cisco routers for the small business a practical guide for it professionals...
Black_Hat_Python_Python_Programming_for_Hackers_and_Pentesters.pdf
Sqlmap readme
Crypto101
Www.dedoimedo.com crash-book
digital marketing training in bangalore
Dgs3612 g cli_dna

What's hot (19)

PDF
Odoo development
PDF
Understand
PDF
Windows_Server_2016_Virtualization White Paper By Veeam
PDF
Apache Web server Complete Guide
PDF
D space manual
PDF
Plesk 8.0 for Linux/UNIX
PDF
Book VMWARE VMware ESXServer Advanced Technical Design Guide
PDF
PDF
Positive Technologies WinCC Security Hardening Guide
PDF
Novell login documentation and troubleshooting
PDF
Zend Server Ce Reference Manual V403
PDF
PDF
MONGODB
PDF
Algoritmicx
PDF
Ibm system storage ds8700 disk encryption redp4500
PDF
Smooth wall express_3_administrator_guide_v2
PDF
PT - Siemens WinCC Flexible Security Hardening Guide
PDF
Odoo development
Understand
Windows_Server_2016_Virtualization White Paper By Veeam
Apache Web server Complete Guide
D space manual
Plesk 8.0 for Linux/UNIX
Book VMWARE VMware ESXServer Advanced Technical Design Guide
Positive Technologies WinCC Security Hardening Guide
Novell login documentation and troubleshooting
Zend Server Ce Reference Manual V403
MONGODB
Algoritmicx
Ibm system storage ds8700 disk encryption redp4500
Smooth wall express_3_administrator_guide_v2
PT - Siemens WinCC Flexible Security Hardening Guide
Ad

Viewers also liked (20)

PDF
Advanced Exploit Development (Updated on 28 January, 2016)
PDF
Linux Exploit Research
PDF
Workshop 101 - Penetration testing & Vulnerability assessment system
PDF
Backtrack 5 - network pentest
PDF
Seminar Hacking & Security Analysis
PDF
Advanced exploit development
PDF
Backtrack 5 - web pentest
PDF
Ethical hacking
PDF
Web Hacking (basic)
PDF
Materi Vulnerability Development
PDF
Workshop 101 - Penetration testing & Vulnerability Assessment
PDF
Workshop tp link router & open wrt
PDF
Exploiting arm linux
PPTX
Welcome to the United States: An Acculturation Conversation
PDF
The (In)Security of Topology Discovery in Software Defined Networks
PDF
Ajit-Legiment_Techniques
PPTX
VMRay intro video
PDF
Automated JavaScript Deobfuscation - PacSec 2007
PPTX
Alur attacking web (sisi client)
PDF
Code obfuscation, php shells & more
Advanced Exploit Development (Updated on 28 January, 2016)
Linux Exploit Research
Workshop 101 - Penetration testing & Vulnerability assessment system
Backtrack 5 - network pentest
Seminar Hacking & Security Analysis
Advanced exploit development
Backtrack 5 - web pentest
Ethical hacking
Web Hacking (basic)
Materi Vulnerability Development
Workshop 101 - Penetration testing & Vulnerability Assessment
Workshop tp link router & open wrt
Exploiting arm linux
Welcome to the United States: An Acculturation Conversation
The (In)Security of Topology Discovery in Software Defined Networks
Ajit-Legiment_Techniques
VMRay intro video
Automated JavaScript Deobfuscation - PacSec 2007
Alur attacking web (sisi client)
Code obfuscation, php shells & more
Ad

Similar to Syllabus Advanced Exploit Development 22-23 June 2013 (20)

PDF
Cisco Virtualization Experience Infrastructure
PDF
IBM eX5 Portfolio Overview IBM System x3850 X5, x3950 X5, x3690 X5, and Blade...
PDF
Introducing and Implementing IBM FlashSystem V9000
PDF
Red paper
PDF
Ibm power systems e870 and e880 technical overview and introduction
PDF
redp5222.pdf
PDF
Intel добавит в CPU инструкции для глубинного обучения
PDF
AIX 5L Differences Guide Version 5.3 Edition
PDF
IBM Power 770 and 780 Technical Overview and Introduction
PDF
sg246506
PDF
Java web programming
PDF
IBM BladeCenter Products and Technology
PDF
java web_programming
PDF
IBM zEnterprise 114 Technical Guide
PDF
Mx Odbc
PDF
Implementing the ibm storwize v3700
PDF
Sg248107 Implementing the IBM Storwize V3700
PDF
IBM Power 750 and 760 Technical Overview and Introduction
PDF
IBM Flex System Interoperability Guide
PDF
C++ annotations version
Cisco Virtualization Experience Infrastructure
IBM eX5 Portfolio Overview IBM System x3850 X5, x3950 X5, x3690 X5, and Blade...
Introducing and Implementing IBM FlashSystem V9000
Red paper
Ibm power systems e870 and e880 technical overview and introduction
redp5222.pdf
Intel добавит в CPU инструкции для глубинного обучения
AIX 5L Differences Guide Version 5.3 Edition
IBM Power 770 and 780 Technical Overview and Introduction
sg246506
Java web programming
IBM BladeCenter Products and Technology
java web_programming
IBM zEnterprise 114 Technical Guide
Mx Odbc
Implementing the ibm storwize v3700
Sg248107 Implementing the IBM Storwize V3700
IBM Power 750 and 760 Technical Overview and Introduction
IBM Flex System Interoperability Guide
C++ annotations version

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Modernizing your data center with Dell and AMD
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Chapter 2 Digital Image Fundamentals.pdf
PPTX
Cloud computing and distributed systems.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
NewMind AI Weekly Chronicles - August'25 Week I
The Rise and Fall of 3GPP – Time for a Sabbatical?
Advanced Soft Computing BINUS July 2025.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Reach Out and Touch Someone: Haptics and Empathic Computing
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Modernizing your data center with Dell and AMD
Per capita expenditure prediction using model stacking based on satellite ima...
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Dropbox Q2 2025 Financial Results & Investor Presentation
20250228 LYD VKU AI Blended-Learning.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Chapter 2 Digital Image Fundamentals.pdf
Cloud computing and distributed systems.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy

Syllabus Advanced Exploit Development 22-23 June 2013

  • 1. HATSECURE TRAINING #SESSION-1 ADVANCED EXPLOIT DEVELOPMENT Danang Heriyadi [email protected] Copyright By Hatsecure Advanced Exploit Development
  • 2. Disclaimer Dilarang merubah isi modul dan menggandakan modul ini tanpa seijin penulis Copyright By Hatsecure Copyright By Hatsecure Advanced Exploit Development
  • 3. Table of Contents Introduction......................................................................................................... 1 0x01 Classic stack overflow....................................................................... 2 Objective................................................................................................ 2 Overview.................................................................................................... 2 Exercise....................................................................................................... 2 Free float FTP Vulnerability................................................................... 3 Fuzzing : Crash the service............................................................... 3 Fuzzing : Finding the Right Offset to EIP.......................................... 3 Controlling the EIP........................................................................... 3 Take over the victim.......................................................................... 3 Conclusion.............................................................................................. 3 0x02 Bypassing Structured Exception Handling.................................. 3 Objective................................................................................................ 3 Overview........................................................................................... 3 Structured Exception Handling......................................................... 3 SEH / Safe SEH Bypassing Theory.................................................... 3 Testing SEH / SafeSEH protection.................................................... 3 Exercise............................................................................................. 3 All Media Server Vulnerability................................................................ 3 Module intruction mapping................................................................ 3 Returning into our shellcode............................................................. 3 Conclusion.............................................................................................. 3 0x03 Bypassing Data Exception Prevention.......................................... 3 Objective................................................................................................ 3 Overview........................................................................................... 3 Copyright By Hatsecure Advanced Exploit Development
  • 4. Data Exception Prevention................................................................ 3 DEP Bypassing theory....................................................................... 3 Testing DEP Protection..................................................................... 3 Case Of study : Sami FTP Vulnerability................................................. 3 Return Oriented Programming.......................................................... 3 Defeating DEP with ROP.................................................................. 3 Returning into our shellcode............................................................. 3 Conclusion.............................................................................................. 3 0x03 Bypassing ASLR in windows 7......................................................... 3 Objective................................................................................................ 3 Overview........................................................................................... 3 Address Space Layout Randomization.............................................. 3 ASLR bypass theory.......................................................................... 3 0x04 Heap Memory Exploitation............................................................... 3 Objective................................................................................................ 3 Overview........................................................................................... 3 Heap Memory Layout........................................................................ 3 Case Of Study : Heap Spraying Internet Explorer................................. 3 Heap Spray Technique....................................................................... 3 Triggering Vulnerability..................................................................... 3 Returning into heap buffer................................................................ 3 Conclusion.............................................................................................. 3 0x05 Metasploit Module Development................................................... 3 Objective................................................................................................ 3 Overview........................................................................................... 3 Convert your exploit to metasploit module...................................... 3 Copyright By Hatsecure Advanced Exploit Development
  • 5. 0x06 Shellcode Development..................................................................... 3 Objective................................................................................................ 3 Overview........................................................................................... 3 Software Required............................................................................ 3 Windows API.................................................................................... 3 Static Shellcode Writing......................................................................... 3 Message Box..................................................................................... 3 Windows Execute............................................................................. 3 Combination shellcode...................................................................... 3 Convert your shellcode to metasploit module................................. 3 Shellcode Injection with metasploit....................................................... 3 Reporting................................................................................................ 3 Copyright By Hatsecure Advanced Exploit Development
  • 6. Introduction Exploit adalah suatu script yang menyerang melalui celah keamanan komputer secara spesifik. Dalam exploit terkadang ditemukan suatu shellcode, shellcode inilah yang menjadi suatu amunisi dari tool exploit. Tool exploit bukan hal yang asing oleh seseorang yang menjadi praktisi keamanan. Tool ini bisa digunakan untuk menguji keamanan secara legal. Pada training “advanced exploit development” ini kita akan membahas dan mengupas bagaimana seorang praktisi keamanan mencari celah keamanan, membuat dan mengembangkan exploit. Copyright By Hatsecure Advanced Exploit Development
  • 7. 0x01 Classic Stack Overflow Objective • Memahami konsep stack overflow • Memahami metode debugging • Memahami metode fuzzing atau fuzz testing • Mampu mengeksploitasi celah stack overflow Overview Celah basis stack overflow terjadi ketika software melakukan penulisan data melebihi kapasitas buffer. Sehingga data yang melebihi tersebut akan merubah nilai yang ada dalam register memory. Contoh source code yang memiliki celah stack overflow : Source code diatas ketika kita kompilasi dan eksekusi.Kita hanya dapat mengisi data maksimal 20 karakter dan apabila lebih dari 20 karakter, data yang kita masukkan akan merubah nilai yang ada dalam register memory. Exercise Cobalah untuk mengulang hingga memahami konsep dan eksploitasi stack overflow Copyright By Hatsecure Advanced Exploit Development #include <stdio.h> int main(){ char data[20]; printf(“Masukkan data : “); gets(data); return 0; }