soft/20/233/2007/ 14452478777 . html
abstract
Buffer overflow vulnerability is the most common form of security vulnerability. More seriously, buffer overflow vulnerability is the cause of most remote network attacks, which can give anonymous Internet users the opportunity to gain partial or full control of the host. Because this kind of attack makes it possible for anyone to gain control of the host, it represents an extremely serious security threat. Therefore, it is very meaningful to use buffer overflow as a means of penetration test.
Buffer overflow is an important means of penetration testing. At present, most buffer overflow programs are based on C/S architecture, so the convenience of their use is limited. This paper adopts the most popular B/S architecture at present, and finally realizes the purpose of using buffer overflow as a Web service to detect whether there is an overflow vulnerability in a remote host and remind users to fix the vulnerability as soon as possible. This paper introduces the principle of buffer overflow and three common buffer overflow vulnerabilities. The execution flow of buffer overflow program is introduced through an example. Writing technology of shell code; Java network programming technology.
On the basis of theoretical research, this paper mainly gives the design and implementation process of buffer overflow as a Web service and the design and implementation of other auxiliary functional blocks of Web service (network security news management, network security forum). Among them, the buffer overflow module and monitoring module are realized by JavaBean technology, and the other parts are realized by JSP technology.
Generally speaking, this penetration test platform realizes the convenience, universality and security of buffer overflow, and can load any overflow program that has been compiled into an executable file. Compared with the traditional test platform based on C/S architecture, it is a great progress.
Keywords: penetration test, buffer overflow, JSP
catalogue
Abstract 1
Abstract 2
Chapter 1 Introduction 5
1. 1 project background 5
1.2 Overview of Permeability Testing 5
Professionalism of penetrant testing 6
1.2.2 Three stages of penetrant detection 6
1.3 paper arrangement 8
Chapter II Buffer Overflow Attack Technology 9
2. 1 Basic principle of buffer overflow 9
2.2 Common forms of buffer overflow 1 1
2.2. 1 stack overflow 1 1
2.2.2 heap overflow 12
2.2.3 format string overflow 13
2.3 Buffer Overflow Execution Process 16
2.4 shell code technology 19
2.4. 1 shell code programming language 19
2.4.2 Relocation of the shell code itself 20
Shell code code 2 1
The third chapter introduces Java network programming technology. 23
3. 1 JavaBean technology 23
3. The concept of1.1JavaBean23
3. 1.2 JavaBean features 23
3. 1.3 JavaBean Attribute 23
3.1.4 Deployment of JavaBeans in JSP Page 24
3.2 Socket network programming technology
3.3 Java data stream 25
3.3. 1 Basic concept of data flow
3.3.2 Introduction to Data Stream Classification 25
Chapter IV Design and Implementation of Buffer Overflow Penetration Test Platform 27
4. 1 Framework design of test platform 27
4. 1. 1 overall frame design 27
4. 1.2 Design of Network Security Press Release Module 28
4. 1.3 Network Security Forum Module Design 29
4. 1.4 Design of Buffer Overflow Penetration Test Module 3 1
4.2 Implementation of Buffer Overflow Penetration Test Coding 34
4.2. 1 Buffer overflow vulnerability selection 34
4.2.2 Implementation of Overflow Module 34
4.2.3 Implementation of Monitoring Module 34
4.2.4 Local Execution Command Realization 36
4.2.5 Buffer overflow status realization 39
Chapter V Experimental Design and Experimental Data 42
5. 1 experiment preparation 42
5.2 SqlServer2000 before sp3 patch 43
5.2. 1 experimental data 43
5.3 SqlServer2000 after sp3 Patch 45
5.3. 1 experimental data 45
Conclusion 47
Reference 48
Thanks 49