Syscall Proxying: whitepaper and samples release

From: Maximiliano Caceres (core.lists.pentest@core-sdi.com)
Date: Tue Aug 06 2002 - 18:13:31 EDT


Syscall Proxying is a powerful technique when staging attacks against
code injection vulnerabilities (buffer overflows, user supplied format
strings, etc) to successfully turn the compromised host into a new
attack vantage point. It can also come handy when "shellcode"
customization is needed for a certain attack (calling setuid(0),
deactivating signals, etc).

Syscall Proxying can be viewed as part of a framework for developing new
penetration testing tools. Developing attacks that actively use the
Syscall Proxying mechanism effectively raises their value.

This technique was presented at the Black Hat Briefings USA 2002. The
presentation along with a whitepaper and sample tools can be found at:

http://www.corest.com/blackhat2002.htm

salud!
max/

-- 
Maximiliano Caceres
Product Engineer
CORE SECURITY TECHNOLOGIES
Florida 141 - 2º cuerpo - 7º piso
C1005AAC Buenos Aires - Argentina
Tel/Fax: (54 11) 4878-CORE (2673)
http://www.corest.com
--- for a personal reply use: Maximiliano Caceres <maximiliano.caceres@corest.com>
----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:24 EDT