newbi3 Posted October 23, 2012 Share Posted October 23, 2012 Today I was at school and I opened up playonlinux on my Linux mint machine to download halo. To my surprise instead of seeing a list of applications to download I saw the raw HTML of my county's "block page". This got me thinking "Hey maybe we got something here". So to continue testing I opened up ettercap to see what was going here. Now I noticed that POL pulls a description of the application from the repository also (and here is the fun part) it looks like it is pulling the installation script from the repository. I have absolutely know clue where to go from here. I have never reverse engineered something before and I am wondering where there might be some documentation on reverse engineering and if there are any vulnerabilities in other applications like this that I can read documentation on. Quote Link to comment Share on other sites More sharing options...
bobbyb1980 Posted October 23, 2012 Share Posted October 23, 2012 You could probably have a 3rd party script run that would rewrite the install script and have your rewritten code run instead of the install script, but I wouldn't call that an exploit. Exploits are generally when an application crashes and you use the crash to gain control of one or more of the registers to get it to jump to your own instructions. Reversing is when you try to figure out what exactly a program is doing and how it's doing it. Reverse engineering and exploit development are different fields, but reversing would be the best place to start. For reversing, the most famous tutorials are Lena's. Random's are also very good too. http://tuts4you.com/download.php?list.17 www.thelegendofrandom.com For exploit writing, Corelan's are the best. www.corelan.be Quote Link to comment Share on other sites More sharing options...
newbi3 Posted October 23, 2012 Author Share Posted October 23, 2012 You could probably have a 3rd party script run that would rewrite the install script and have your rewritten code run instead of the install script, but I wouldn't call that an exploit. Exploits are generally when an application crashes and you use the crash to gain control of one or more of the registers to get it to jump to your own instructions. Reversing is when you try to figure out what exactly a program is doing and how it's doing it. Reverse engineering and exploit development are different fields, but reversing would be the best place to start. For reversing, the most famous tutorials are Lena's. Random's are also very good too. http://tuts4you.com/...oad.php?list.17 www.thelegendofrandom.com For exploit writing, Corelan's are the best. www.corelan.be Thanks a lot for this I have been looking for a place to start for a while Quote Link to comment Share on other sites More sharing options...
ghosthunter007 Posted December 2, 2012 Share Posted December 2, 2012 One possible way to exploit it is to arp spoof the network route all traffic thru your box ( you become the router) then write a IPtables rule to run a script if conditions are met (affectively spoofing the repo site) Then the script you allow them to upload and run will have anything from email keylogger to adding a root user account. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.