Nytro Posted August 4, 2012 Report Posted August 4, 2012 Defeating DEP through a mapped fileby Homeostasie (Nicolas.D)Contents1. Introduction............................................................................................................32. Description of the attack scenario..........................................................................43. Building a ROP exploit..........................................................................................73.1. Step 1 - Open a file containing our shellcode ......................................................................73.2. Step 2 - Craft mmap() parameters into the stack..................................................................93.2.1. ROP chaining for crafting the first argument to 0......................................................103.2.2. ROP chaining for crafting the second and the fourth argument to 1..........................123.2.3. ROP chaining for crafting the third argument to 4.....................................................133.2.4. ROP chaining for crafting the fifth argument to “fd” value (file descriptor).............143.2.5. ROP chaining for crafting the sixth argument to 0.....................................................143.3. Step 3 – Call mmap() and jump on the mapped area..........................................................154. Conclusion...........................................................................................................18Download:http://shell-storm.org/papers/files/800.pdf Quote