6787212 2001-07-23 19:52 -0600 /41 rader/ <aleph1@securityfocus.com> Sänt av: secpapers-return-37-9616=lyskom.lysator.liu.se@securityfocus.com Importerad: 2001-07-24 03:59 av Brevbäraren Extern mottagare: secpapers@securityfocus.com Extern kopiemottagare: vuln-dev@securityfocus.com Mottagare: SECPAPERS (import) <44> Mottagare: Bugtraq (import) <18286> Sänt: 2001-07-24 04:36 Ärende: UNIX Assembly Codes Development For Vulnerabilities Illustration Purposes ------------------------------------------------------------ UNIX Assembly Codes Development For Vulnerabilities Illustration Purposes Last Stage of Delirium Research Group This technical document contains information about the specifics of writing assembly components for proof of concept codes on different operating systems/architectures. Specifically, it focuses on commercial UNIX systems: IRIX/MIPS, HP-UX/PA-RISC, AIX/PowerPC/POWER and Solaris/x86/Sparc. It is neither meant to be a complete guide to the aforementioned computer architectures nor it is the assembly language tutorial. It has been written as a result of our side-effect investigation efforts in the area of security research pertaining to proof of concept codes development for security vulnerabilities illustration purposes. Obviously, it is destined for code developers specializing (having/looking for an experience) in the area of buffer overflow and format string vulnerabilities, however it is limited only to these assembly parts. For information regarding general proof of concept codes development, please refer to other papers. This paper is divided into several inter-related parts. In the beginning some basic information about various processor architectures and their important characteristics is given. Next, a detailed discussion of the system call invocation mechanisms, which seems to be crucial for further parts, is presented in the context of different operating systems. It is followed by the introduction to coding requirements, such as writing position independent and zero free assembly codes. Finally, a detailed discussion of several assembly routines with special emphasis on their functionality is presented. In the appendices of this paper you will also find source codes of every routine for all discussed operating systems and architectures along with sample code of their usage. http://lsd-pl.net/papers.html#assembly http://lsd-pl.net/asmcodes.html http://lsd-pl.net/documents/asmcodes-1.0.2.pdf http://lsd-pl.net/documents/asmcodes-blackhat.ppt http://lsd-pl.net/projects/asmcodes-1.0.2.tar.gz -- Elias Levy SecurityFocus.com http://www.securityfocus.com/ Si vis pacem, para bellum (6787212) / <aleph1@securityfocus.com>/---(Ombruten)