DÜNDEN BUGÜNE EXPLOIT
DÜNYASI
Onur ALANBEL
$id -un
• Bilgisayar Mühendisi (İYTE)
• Kurucu @cricomtr (cri.com.tr)
• Geliştirici @TaintAll (taintall.com)
• Uygulama Güvenliği Araştırmacısı
• Github: github.com/onura
• Twitter: @onuralanbel
• https://packetstormsecurity.com/search/?q=onur+alanbel
VULNERABILITYVS POCVS
EXPLOIT
• Vulnerability: istismar edilebilir hata (bug).
VULNERABILITYVS POCVS
EXPLOIT
• Vulnerability: istismar edilebilir hata (bug).
• PoC: Zafiyeti tetikleyen kod.
VULNERABILITYVS POCVS
EXPLOIT
• Vulnerability: istismar edilebilir hata (bug).
• PoC: Zafiyeti tetikleyen kod.
• Exploit: Program akışını manipüle eden kod ve girdi
birleşimi.
NEREDE BULUNURLAR?
NEDEN KULLANILIRLAR?
• Yetkisiz Erişim
• YetkiYükseltme
SMASHINGTHE STACK
1996-11-08
MORRIS WORM
1988-11-02
MS08-067
• RPC RCE
• Conficker
DÜNVS BUGÜN
• SDLC (no stack overflow?)
DÜNVS BUGÜN
DÜNVS BUGÜN
➤ Buffer Overrun
➤ Buffer Overflow
➤ Stack overflow
➤ Heap overflow
➤ UAF
➤ Double Free
➤ Memory Corruption
➤ Unbound Memory Read / Write
➤ Arbitrary Memory Read / Write
➤ Type Confusion
➤ Race Condition
➤ Logic Bugs
➤ ….
CODE
Program
Instructions
RX
STACK
User
Input
RWX
CODE
Program
Instructions
RX
STACK
User
Input
RW
ROP
Return
Oriented
Programming
Non-Executable Memory or
DEP
CODE
Program
Instructions
RX
STACK
User
Input
RW
Address Space Layout Randomization
Stack
Heap
DLL Base
Code Base
ASLR BYPASS
• Info Leak
• Partial PC Overwrite
• Non-ASLR Components/Libraries
• Heap Spray (Nop Sled)
• PLT Overwrite
• GOT Dereference
SANDBOX
Target Process
OS Components
Limited Access
Other Processes
Kernel
shellcode
User
Process
Trigger a
NULL
Pointer
Dereference
Kernel
shellcode
User
Process
Run/Read
Kernel
PAGEZERO
inaccessable
User
Process
:(
Compatibility
Issues
ROP
Kernel
Fake Stack
User
Process
SMEP
Supervisor Mode Execution Prevention
ROP
Fake Stack
Kernel User
Process
SMEP/
SMAP
Supervisor Mode Access Prevention
KASLR BYPASS
• Info Leak
• Partial PC Overwrite
• Side Channel Attacks (UsuallyTime Based)
DIĞER KORUMALAR
• Stack Canaries/Cookies
• Memory Protector, Isolated heap
• Different Data/Code Caches
• …
PEGASUS OLAYI
• Milyon Dolarlık Exploit Nasıl Gözükür?
Kurban bir linke tıklar
UAF (CVE-2016-4657)
Arbitrary Read to
Break ASLR
Arbitrary Write to
Gain Code Execution
Fake NULL Pointer
Dereference
Info Leak (CVE-2016-4655)
Break KASLR
Kernel UAF (CVE-2016-4656) to
Jailbreak
ARKASINDA KİMVAR?
• NSO GroupTechnologies 2010 da kurulan İsrail çıkışlı
bir güvenlik firması.
• 200 çalışan, $40 milyon 2013, $150 milyon in 2015
yıllık gelir.
• İş tanımları: NSO Group provides "authorized
governments with technology that helps them
combat terror and crime”.
GÜNDEM
• Siber Silah
• Siber Caydırıcılık
• Aktif Siber Savaş
Dünden Bugüne Exploit Dünyası

Dünden Bugüne Exploit Dünyası