Hello workshop - Hello DEP, ASLR - HU or EN

During the workshop we crack a previously installed sample application on the provided Windows 2008 SP2 32 bit server. The application contains a buffer overflow vulnerability. To take advantage of this vulnerability we prepare an exploit that bypasses the DEP and ASLR protection mechanisms set as default on Windows Server 2008. First we bypass the DEP then we play with the ASLR. Other protections like SEHOP or SAFESEH will not be examined. We will use the MetaSploit framework to generate the payload, which we will upload after the abuse of the application.
The workshop is an intermediate level course so we suppose that participants are familiar with the fundamentals of stack based exploits.

Material: Everyone will get a virtual machine in .ova format. The virtual machine contains the vulnerable application and all the necessary tools e.g. debugger, metasploit. There will be English language documentation, to repeat/practice the demonstration.

Requirements for the participants: a laptop which is able to run a Windows 2008 32 bit SP2 virtual machine. Space requirement is about 15GB for the virtual machine and about 4GB for the .ova file. DVD reader, and/or USB plugin, and/or gigabites network adapter to copy the .ova file. Required memory: minimum 1GB free memory for the virtual machine. An already installed virtualization software:  Virtualbox (4.2.6 or higher is recommended). The virtual machine was made using Virtualbox but participants may, at their own risk, use any other virtualization environment vmware, qemu... which is capable of handling .ova files.


Sponsors:

Gold
Gold
Gold
Silver
Silver
Silver
Silver
Silver
Silver
Bronze
JOB
Technical