基于Python的SEH漏洞渗透模块实现  被引量:1

Implementation of SEH Vulnerability Penetration Module based on Python

在线阅读下载全文

作  者:刘丹 LIU Dan(Department of Digital Arts,Suzhou Industrial Park Branch,Jiangsu Union Technical Institute,Suzhou 215123,China)

机构地区:[1]江苏联合职业技术学院苏州工业园区分院数字艺术系,江苏苏州215123

出  处:《成都工业学院学报》2022年第1期19-24,共6页Journal of Chengdu Technological University

摘  要:缓冲区溢出漏洞攻击是通过修改SEH链表中内容,改变原代码的执行流程,转而执行恶意代码来实现的。以文件分享系统软件为例,介绍了SEH漏洞挖掘过程、分析了漏洞产生原因、漏洞利用原理。具体阐述了基于Python语言的SEH漏洞渗透模块开发步骤,最终实现了利用SEH漏洞远程控制客户端,为基于Python的SEH漏洞渗透开发提供了通用的代码模板。The buffer overflow vulnerability attack is realized by modifying the content in the SEH linked list,changing the execution flow of the original code,and executing malicious code instead.Taking the file sharing system software as an example,the SEH vulnerability mining process was introduced,the cause of the vulnerability and the principle of vulnerability utilization was analyzed,The development steps of SEH vulnerability penetration module based on Python language were described in detail,and finally the remote control client using SEH vulnerability was realized,which provides a general code template for SEH vulnerability penetration development based on Python,and has strong practical value.

关 键 词:结构化异常处理 SafeSEH PYTHON METASPLOIT 漏洞渗透 

分 类 号:TP393[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象