+ All Categories
Home > Documents > 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

Date post: 27-Mar-2015
Category:
Upload: brooke-elliott
View: 218 times
Download: 2 times
Share this document with a friend
Popular Tags:
43
1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3
Transcript
Page 1: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

1

Progetto Sicurezza di Rete

Assembler IA32 (parte II)

Lez. 3

Page 2: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

2

Puntatori

• Indirect addressing allows registers to act like pointer variables. To indicate that a register is to be used indirectly as a pointer, it is enclosed in square brackets ([])

• Because AX holds a word, line 3 reads a word starting at the address stored in EBX. If AX was replaced with AL, only a single byte would be read.

• It is important to realize that registers do not have types like variables do in C. What EBX is assumed to point to is completely determined by what instructions are used

Page 3: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

3

Sottoprogrammi

• A subprogram is an independent unit of code that can be used from different parts of a program

• A jump can be used to invoke the subprogram, but returning presents a problem

• If the subprogram is to be used by different parts of the program, it must return back to the section of code that invoked it

Page 4: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

4

Subroutine

Page 5: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

5

Stack

• Many CPU’s have built-in support for a stack A stack is a Last-In First-Out (LIFO) list

• The stack is an area of memory that is organized in this fashion. The PUSH instruction adds data to the stack and the POP instruction removes data

• The data removed is always the last data added• The processor references the SS register automatically for all stack

operations. For example, when the ESP register is used as a memory address, it automatically points to an address in the current stack. Also, the CALL, RET, PUSH, POP, ENTER, and LEAVE instructions all perform operations on the current stack.

• The ESP register contains the address of the data that would be removed from the stack. This data is said to be at the top of the stack

• Data can only be added in double word units. That is, one can not push a single byte on the stack

Page 6: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

6

Stack

Page 7: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

7

PUSH/POP

• The PUSH instruction inserts a double word on the stack by subtracting 4 from ESP and then stores the double word at [ESP]

• The POP instruction reads the double word at [ESP] and then adds 4 to ESP

• The 80x86 also provides a PUSHA instruction that pushes the values of EAX, EBX, ECX, EDX, ESI, EDI and EBP registers (not in this order). The POPA instruction can be used to pop them all back off.

• The code below demostrates how these instructions work and assumes that ESP is initially 0x1000

Page 8: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

8

PUSH/POP

Page 9: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

9

CALL/RET

• The 80x86 provides two instructions that use the stack to make calling subprograms quick and easy. The CALL instruction makes an unconditional jump to a subprogram and pushes the address of the next instruction on the stack.

• The RET instruction pops off an address and jumps to that address.

• When using these instructions, it is very important that one manage the stack correctly so that the right number is popped off by the RET instruction

Page 10: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

10

Esempio

Page 11: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

11

Calling Convention

• When a subprogram is invoked, the calling code and the subprogram (the callee) must agree on how to pass data between them.

• High-level languages have standard ways to pass data known as calling conventions.

• The calling conventions can differ from compiler to compiler or may vary depending on how the code is compiled (e.g. if optimizations are on or not).

• One universal convention is that the code will be invoked with a CALL instruction and return via a RET.

Page 12: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

12

Parametri via Stack

• Parameters to a subprogram may be passed on the stack. They are pushed onto the stack before the CALL instruction

• If the parameter is to be changed by the subprogram, the address of the data must be passed, not the value

• If the parameter’s size is less than a double word, it must be converted to a double word before being pushed.

Page 13: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

13

Stack Param

• When the subprogram is invoked, the stack looks like Figure 4.1. The parameter can be accessed using indirect addressing ([ESP+4] )

Page 14: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

14

Stack

• If the stack is also used inside the subprogram to store data, the number needed to be added to ESP will change.

• It can be very error prone to use ESP when referencing parameters. To solve this problem, the 80386 supplies another register to use: EBP. This register’s only purpose is to reference data on the stack.

Page 15: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

15

Epilogo/prologo

• The C calling convention mandates that a subprogram first save the value of EBP on the stack and then set EBP to be equal to ESP. This allows ESP to change as data is pushed or popped off the stack without modifying EBP

• At the end of the subprogram, the original value of EBP must be restored (this is why it is saved at the start of the subprogram)

Prologo

Epilogo

Page 16: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

16

EBP

Page 17: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

17

Calling Con

• After the subprogram is over, the parameters that were pushed on the stack must be removed

• The C calling convention specifies that the caller code must do this

• The Pascal calling convention specifies that the subprogram must remove the parameters

Page 18: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

18

Variabili locali

• The stack can be used as a convenient location for local variables. This is exactly where C stores normal (or automatic in C lingo) variables.

• Using the stack for variables is important if one wishes subprograms to be reentrant. A reentrant subprogram will work if it is invoked at any place, including the subprogram itself. In other words, reentrant subprograms can be invoked recursively.

• Using the stack for variables also saves memory. Data not stored on the stack is using memory from the beginning of the program until the end of the program (C calls these types of variables global or static).

• Datastored on the stack only use memory when the subprogram they are defined for is active.

• Local variables are stored right after the saved EBP value in the stack.• They are allocated by subtracting the number of bytes required from

ESP

Page 19: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

19

Prologo/epilogo

Page 20: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

20

Stack frame

• Figure 4.9 shows what the stack looks like after the prologue of the program in Figure 4.8. This section of the stack that contains the parameters, return information and local variable storage is called a stack frame. Every invocation of a C function creates a new stack frame on the stack.

Page 21: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

21

Enter/Leave

• The ENTER instruction performs the prologue code and the LEAVE performs the epilogue

• The ENTER instruction takes two immediate operands. • For the C calling convention, the second operand is always 0.

The first operand is the number bytes needed by local variables. The LEAVE instruction has no operands

Page 22: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

22

external

• A multi-module program is one composed of more than one object file.

• The linker combines the object files into a single executable program.

• The linker must match up references made to each label in one module (i.e. object file) to its definition in another module. In order for module A to use a label defined in module B, the extern directive must be used. After the extern directive comes a comma delimited list of labels.

• The directive tells the assembler to treat these labels as external to the module. That is, these are labels that can be used in this module, but are defined in another

Page 23: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

23

Assembly e C

• Assembly is used, only used for small parts of the code.

• This can be done in two ways: calling assembly subroutines from C or

• inline assembly. Inline assembly allows the programmer to place assembly statements directly into C code.

• The assembly code must be written in the format the compiler uses. Different compilers require different formats. Borland and Microsoft require MASM format. DJGPP and Linux’s gcc require GAS3 format.

Page 24: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

24

Convenzioni

• EBX, ESI, EDI, EBP, CS, DS, SS, ES: if a subroutine changes their values, it must restore their original values before the subroutine returns

• Usually the stack is used to save the original values of these registers

• Most C compilers prepend a single underscore( ) character at the beginning of the names of functions and global/static variables. The Linux gcc compiler does not prepend any character

• Under the C calling convention, the arguments of a function are pushed on the stack in the reverse order that they appear in the function call.

Page 25: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

25

printf

• Consider the following C statement: printf("x = %d\n",x); here it shown how this would be compiled

• The printf function is one of the C library functions that can take any number of arguments however the format string is pushed last, its location on the stack will always be at EBP + 8 no matter how many parameters are passed to the function

• The printf code can then look at the format string to determine how many parameters should have been passed and look for them on the stack

Page 26: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

26

printf

Page 27: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

27

Esercizio

• Scrivere un programma assembler che legge 5 valori interi e stampa la loro somma, prodotto il Max ed il Min. Per l’effettuazione delle operazioni di I/O il programma deve usare due subroutine esterne che utilizzano le procedure scanf e printf del C.

Page 28: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

28

lea

• Calculating the address of a local variable (or parameter) on the stack is not as straightforward. However, this is a very common need when calling subroutines

• There is an instruction that does the desired calculation. It is called LEA (for Load Effective Address)

• The following would calculate the address of x and store it into EAX: lea eax, [ebp - 8]

Page 29: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

29

Interrupt e eccezioni

• The processor provides two mechanisms for interrupting program execution, interrupts and exceptions

• An interrupt is an asynchronous event that is typically triggered by an I/O device

• An exception is a synchronous event that is generated when the processor detects one or more predefined conditions while executing an instruction. The IA-32 architecture specifies three classes of exceptions: faults, traps, and aborts

• The processor responds to interrupts and exceptions in essentially the same way

Page 30: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

30

Interrupt ed eccezioni

• When an interrupt or exception is signaled, the processor halts execution of the current program or task and switches to a handler procedure that has been written specifically to handle the interrupt or exception condition. The processor accesses the handler procedure through an entry in the interrupt descriptor table (IDT). When the handler has completed handling the interrupt or exception, program control is returned to the interrupted program or task

• The IA-32 Architecture defines 17 predefined interrupts and exceptions and 224 user defined interrupts, which are associated with entries in the IDT

• Each interrupt and exception in the IDT is identified with a number, called a vector

Page 31: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

31

Page 32: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

32

Interrupt

• If the code segment for the handler procedure has the same privilege level as the currently executing program or task, the handler procedure uses the current stack

• The processor does the following when calling an interrupt or exception handler:

• Pushes the current contents of the EFLAGS, CS, and EIP registers (in that order) on the stack

• Pushes an error code (if appropriate) on the stack.• Loads the segment selector for the new code segment and the new

instruction pointer (from the interrupt gate or trap gate) into the CS and EIP registers, respectively

• If the call is through an interrupt gate, clears the IF flag in the EFLAGS register.

• Begins execution of the handler procedure• A return from an interrupt or exception handler is initiated with the IRET

instruction. The IRET instruction is similar to the far RET instruction, except that it also restores the contents of the EFLAGS register for the interrupted procedure

Page 33: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

33

Interrupt

• The INT n, INTO, INT 3, and BOUND instructions allow a program or task to explicitly call an interrupt or exception handler. The INT n instruction uses an interrupt vector as an argument, which allows a program to call any interrupt handler

Page 34: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

34

Syscall

• The only way a user application can call operating system services is through the concept of a system call instruction

• Different computer architectures have different system call instructions,

• but they are all common in operation: upon their execution the microprocessor switches operating mode from user to supervisor equivalent and passes execution to the appropriate kernel system call handling routine.

• Upon its completion, the execution is returned to the user process at the next instruction following the system call invocation instruction (not always, see AIX discussion)

• Simultaneously, the microprocessor mode of operation is also switched back to the one reflecting user space applications

Page 35: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

35

Syscall

• Qualunque funzione si voglia far eseguire al Kernel, si utilizzerà sempre la stessa chiamata, e più precisamente, si invierà in interrupt software 0x80.

• Il valore che avremo posto nel registro %eax indicherà al Kernel quale funzione eseguire. I parametrei della funzione andranno messi negli altri registri del processore, in particolare: • primo parametro in %ebx, • secondo parametro in %ecx, • terzo parametro in %edx, • quarto parametro in %esi, • quinto parametro in %edi, • sesto parametro in %ebp,

• Il valore di ritorno verrà lasciato in %eax. Se il valore in %eax è negativo, allora la funzione stà riportando un'errore ed il codice d'errore è il valore di %eax cambiato di segno.

Page 36: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

36

Syscall

• Per sapere i codici da porre in %eax per le funzioni che ci servono, dovremo cercarli nel file /usr/include/asm/unistd.h.

• Per conoscere l'uso di ogni singola funzione, il tipo ed i valori leciti per ogni parametro, il valore ritornato ed i codici di errore prodotti si deve fare riferimento alla sezione 2 del manuale, ad esempio, per la terminazione del programma si può dare il comando man 2 exit

Page 37: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

37

Exit

• Ad esempio, la funzione exit che termina il programma ha il seguente prototipo, tratto dal manuale: • void _exit(int status);

• Dal file /usr/include/asm/unistd.h scopriamo che il codice per _exit (costante __NR_exit) ha valore 1.A questo punto, se vorremo terminare il programma con un codice di terminazione 0, dovremo scrivere:• mov ebx, 0 ; primo argomento • mov eax, 1 ; system call number • int 0x80 ; interrupt

Page 38: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

38

Write (printf)

• NR_write [Codice 4] funzione • ssize_t write(int fd, const void *buf, size_t count);

   size_t countconst void *bufint fd4

%ebp%edi%esi%edx%ecx%ebx%eax

segment .datahello db “Hello World”

db 0x0a

segment .text : mov eax,4

mov ebx,1mov ecx,hellomov edx 13int 0x80

Page 39: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

39

Shell code

• Codice eseguibile che può essere iniettato a run-time in un programma in esecuzione

• Es:mov eax, 0x01 ; The syscall number for exitxor ebx, ebx ; EBX will now contain the value 0int 0x80 ; and activate !

char shellcode[] = "\xb8\x01\x00\x00\x00\x31\xdb\xcd\x80";

Page 40: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

40

Addressing problem

In most cases of shellcode you cannot use hardcoded memory addresses. So in order to know where your data is located, you'll need to do a little trick:

jmp    stuff   code:

pop    esi

<instructions>stuff:

call   code db     'This is my string#'     

What you see in the above code is that we 'jmp' from the beginning of the code to 'stuff' from where we 'call code'. At the beginning from 'code' we 'pop esi'. Now esi will represent the location of the string 'This is my string' 

Page 41: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

41

Null Byte

NULL bytes are string delimeters and kill shellcode. If you created shellcode that contains such bytes: Don't bother using it and try to fix the problem. So since you cannot have NULL bytes in the shellcode you will have to add them at runtime. Now that we have seen in the above example how to get the location of bytes in our string:

jmp    stuff  code:

pop    esixor    eax,eax  ; doing this will make eax NULL mov    [esi + 17],al   ; put a null byte byte on [esi + 17]  

stuff:call   codedb     'This is my string#'

 In the above example we replace '#' with a NULL byte and terminate the string 'This is my string' at run time. For clean coding purposes it I find it the best to alter you strings at the beginning of you assembly code.

Page 42: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

42

HMW

• Scrivere un programma assembler che esegue attraverso una chiamata di sistema diretta la shell

• Scrivere un programma C che genera in output il codice binario del suddetto programma, usando il formato esadecimale

• Facoltativo: Scrivere un programma assembler che usando come subroutine il programma precedente, sia in grado di eseguire un qualunque comando di shell fornito in input

Page 43: 1 Progetto Sicurezza di Rete Assembler IA32 (parte II) Lez. 3.

43

EXECVE

Execve is the almighty system call that can be used to execute a file. The linux implementation looks like this: int execve (const char *filename, char *const argv [], char *const envp[]); So what we need is to get 3 pointers, one to our filename, one to the arguments array and one to environment array. Since we are not interested in the environment array we will use NULL for it. We will implement this execve as follows:

execve("pointer to string /bin/sh","pointer to /bin/sh","pointer to NULL");


Recommended