Solved

Buffer overflow

Posted on 2013-01-18
8
630 Views
Last Modified: 2013-02-10
What is buffer overflow and how to find vulnerabilities in a network.
0
Comment
Question by:pawanopensource
  • 2
  • 2
8 Comments
 
LVL 61

Accepted Solution

by:
btan earned 167 total points
ID: 38797877
This has all got to do with program codes not having  sufficient boundary checks when inserting data received (in appl or network means) to a buffer allocated for program use. The whole intent is to overflow the buffer size and eventually exploit the program  by leading to execute not intended codes (commonly is malicious and known as shellcode). The exploitation can be disastrous. Common indicators are service is down (denial of service), and as a whole the program just goes berserk.....

The only way to rectify the vulnerability is to close the program holes (coding needed most of the time). many example can be easily found and is also well published on exploitation steps using open tool (really!).

E.g. This on an appl taking a socket call with buffer overflow ..
http://securityxploded.com/remote-buffer-overflow-exploits.php

E.g. Security tutorial and forum - easily search with such keyword
https://www.corelan.be/?s=buffer+overflow&search=Search
http://resources.infosecinstitute.com/?s=buffer+overflow

So as all would ask...how do we find such vulnerability ... I would say this would be all avoided if the code release has been validated to be secure using static and dynamic code (esp those internet facing)....e.g. for web, there is OWASP Phoenix compilation
https://www.owasp.org/index.php/Phoenix/Tools

That is the earliest detection and probably to reduce as much attack surface. But commonly such overflow will be known vulnerability and vulnerability scanner should be able to pick it up matching to the pattern, data bank collation etc. They are tagged with CVE such as easily found in such search

http://www.cvedetails.com/vulnerability-search.php?f=1&vendor=&product=&cveid=&cweid=&cvssscoremin=&cvssscoremax=&psy=&psm=&pey=&pem=&usy=&usm=&uey=&uem=&opov=1

One specific can be this
http://www.securiteam.com/exploits/5SP3A008UA.html

For scanners, there are wide variety and I will suggest Security Content Automation Protocol (SCAP) based (e.g. Tenable's Nessus, SAINT, eEye's Retina as below)

http://nvd.nist.gov/validation_eeye.cfm
http://nvd.nist.gov/validation_saint.cfm
http://nvd.nist.gov/validation_tenable.cfm

There are also other open ones and can find more @ http://sectools.org/tag/vuln-scanners/
0
 
LVL 51

Assisted Solution

by:ahoffmann
ahoffmann earned 333 total points
ID: 38797910
buffer overflows are difficult to find with penetration testing, I highly recommend to use source code analyzing tools (SCA) for that
(some free tools are mentioned at OWASP's Phoenix Tools (see breadtan's link above), but most of these tools are $$$$
0
 

Author Comment

by:pawanopensource
ID: 38800988
Thx Experts,

Till now what i understand is that if a hackers find a public ip n finds some open ports than he writes a program like print "i am a hacker" * 2000 times. than using metaploit techniques he insert his program.

can we make buffer overflow using python ?
0
 
LVL 61

Expert Comment

by:btan
ID: 38801203
In my post the first example is using python for validation to the open port. Metasploit is more of a delivery channel for your shellcode once the vulnerability is penetrated..of course you can control Metasploit through RPC using python

http://www.fishnetsecurity.com/6labs/blog/scripting-metasploit-python

Or translate into Metasploit module...

https://www.corelan.be/index.php/2009/08/12/exploit-writing-tutorials-part-4-from-exploit-to-metasploit-the-basics/

PS lets not have this exchanges become into writing exploit...you can try find example at those site link shared.
0
 
LVL 51

Assisted Solution

by:ahoffmann
ahoffmann earned 333 total points
ID: 38801486
> can we make buffer overflow using python ?
yes

(but I assume that you want to ask another question ;-)
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

The purpose of this article is to demonstrate how we can use conditional statements using Python.
Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you s…
The viewer will learn how to pass data into a function in C++. This is one step further in using functions. Instead of only printing text onto the console, the function will be able to perform calculations with argumentents given by the user.
The viewer will learn additional member functions of the vector class. Specifically, the capacity and swap member functions will be introduced.

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now