hmmm every step / chapter already has a fully working script that demonstrates to spray the heap – all of the scripts are available for download here : http://redmine.corelan.be/projects/corelan-heapspray Are you looking for exploits that use heap spraying ? The tutorial is not really about exploiting, but more about delivering the payload. Is there a specific example you would like to see added ? tx
yes,for example exploit browser (IE\FF)bug with heap spray,you can also wirte another article about it .
Yes, Sir. If possible would you like to demonstrate IE 8 vulnerability using HeapSpray to bypass the protection mechanism…
are you interested in seeing the IE8 bug ? or the heapspray itself ? Like I said – this post is about heap spraying, not exploiting browser bugs
this awesome article + this one http://www.vupen.com/blog/20120117.Advanced_Exploitation_of_Windows_MS12-004_CVE-2012-0003.php , are enought to exploit successfully the heap on ie8 & 9
IE8 full bug description and reliable exploit development can be done. Peter sir if you have time, I would request you to write an article on IE 8 bug and it’s exploitation.
Hello, I am learning a lot with you, but I have a question in my head, I have tested on ie9 with the technique heap spray and somestimes doesnt works (the allocation yes) because the letters dont works as nops (to random -> theblock += Math.floor(Math.random()*13)+47; its ok for example) and somestimes its ok with the nop character 0x90 (the allocation too), Why is this? Perhaps there is some more protection? Tested on win/XP SP3.
the random chars don’t work as nops because they aren’t nops. IE9 has DEP enabled and only runs on Vista and Windows 7 as far as I can tell. In other words, you should not jump to the heap, but return to the rop chain placed at the predictable address in the heap.
hi peter, Impressive 11 tutorials , I was fooling around for ASLR and DEP .. I got something here. but i want to explore more .. Please give me some other reference to go and dig in ASLR, DEP , bypassing. Cheers !!
Nice post. But I have a doubt. A crash STATUS_HEAP_CORRUPTION (0xc0000374) can be exploited for code execution?
hi peter, i had problem while i recreating exploit writing tutorial on heap spraying , worked well up to object we want to load into memory but i didn’t crashing the process, i checked the aosmtp.dll it loaded perfectly, target.AddAttachments(payload) didn’t crashing it …..
Hello, I tried to load heapsray_ie9.rb inside the latest version of metasploit. Maybe, this version is not compatible with your script because when I tried to load it, I have the following error : — msf > use exploit/windows/browser/heapspray_ie9 [-] Failed to load module: exploit/windows/browser/heapspray_ie9 — heapspray_ie9.rb file is located into the following path : D:\Metasploit\msf3\modules\exploits\windows\browser Do you know how to resolv this issue ? Regards,
Thanks for all the excellent tutorials. I had doubt in the simple bash script: Shouldn’t the length of chunk after the sSuBsTriNg operation be 2046 due to the unescaped property of chunk object returning only half the actual length of string?