http://www.securitysift.com/windows-exploit-development-part-6-seh-exploits/
SEH Example
Let’s take a look at how SEH is implemented in practice, using Windows Media Player as an example. Recall from Part 1 of this exploit series that you can view the contents of the TEB using the !teb command in WinDbg. Here is a snapshot of the running process threads and a look at one of the associated TEBs for Windows Media Player (on a Win XP SP3 machine):
Notice the ExceptionList address. This is the address of the start of the SEH chain for that thread (yours may vary). In other words, this address points to

本文通过分析Windows Media Player中的SEH(结构化异常处理)机制,探讨了如何在Linux环境下实现类似的异常处理。作者展示了如何在Immunity Debugger中查看SEH链,并讨论了利用SEH构造可靠exploit的方法。示例中,作者使用了一个简单的C程序,展示了在Linux中如何处理异常,以达到类似Windows SEH的效果。

最低0.47元/天 解锁文章
615

被折叠的 条评论
为什么被折叠?



