How to Cook Cisco: Exploit Development for Cisco IOS - George Nosenko - Ekoparty Security Conference - 2017
Ekoparty Security Conference via YouTube
Overview
Syllabus
Intro
Cisco Exploitation Milestones
Cisco Diversity
Our Target
Vulnerability
Mitigations
Common Steps to Arbitrary Code Execution
Cisco IOS Debugging
Gain Control
DEP Bypass Techniques
Return Oriented Programming (PowerPC)
Multitask Gadget
Multiload Gadget
How To Disable DEP
How does DEP work on PowerPC ?
PowerPC 405: TLB Entry
PowerPC 405: Zone Protection Register
PowerPC 405: DEP Disable Gadget
PowerPC 405: DEP Disable Chain
PowerPC e500: TLB Entries
PowerPC e500: DEP Disable Gadget
Staged Shellcode
Shellcode hunting
10-Memory structure
Packet Fragmentation
The caches invalidation
Omelet Egg Hunter (192 bytes)
Checking Code Integrity
Code Integrity Checking Bypass
Free Space Between Regions
Writing Shellcode on the C language
Image-independent shellcodes
Completion of the shellcode
Infinite Loop: Watch-Dog Bypass
ARBITRARY CODE EXECUTION: GEEKPWN CASE
Demo
Taught by
Ekoparty Security Conference