There are situations when c interacts with golang for example in a library, and its possible to exploit a golang function writing raw memory using an unsafe.Pointer() parameter.
When golang receive a null terminated string on a *C.Char parameter, can be converted to golang s tring with s2 := C.GoString(s1) we can do string operations with s2 safelly if the null byte is there.
When golang receives a pointer to a buffer on an unsafe.Pointer() and the length of the buffer on a C.int, if the length is not cheated can be converted to a []byte safelly with b := C.GoBytes(buf,sz)
Buuut what happens if golang receives a pointer to a buffer on an unsafe.Pointer() and is an OUT variable? the golang routine has to write on this pointer unsafelly for example we can create a golangs memcpy in the following way:
We convert to uintptr for indexing the pointer and then convert again to pointer casted to a byte pointer dereferenced and every byte is writed in this way.
If b is controlled, the memory can be written and the return pointer of main.main or whatever function can be modified.
 https://play.golang.org/p/HppcVpLfuMf
 The return addres can be pinpointed, for example 0x41 buffer 0x42 address:
We can reproduce it simulating the buffer from golang in this way:
we can dump the address of a function and redirect the execution to it:
 https://play.golang.org/p/7htJHJp8gUJ
 In this way it's possible to build a rop chain using golang runtime to unprotect a shellcode.
More information
- Hack Tools Mac
 - Pentest Reporting Tools
 - Hacker Tools Software
 - Hacking Tools For Pc
 - Hacking App
 - Physical Pentest Tools
 - Blackhat Hacker Tools
 - How To Hack
 - Hacking Tools Free Download
 - Hack Tools For Games
 - Pentest Tools For Windows
 - Hacker Tools 2020
 - Hacker Tools Apk
 - Hacker Tools Hardware
 - Hacking Tools Mac
 - Hacker Tools For Ios
 - Pentest Tools Nmap
 - Pentest Tools Nmap
 - Hack Rom Tools
 - New Hacker Tools
 - Pentest Tools Linux
 - What Are Hacking Tools
 - Hacker Tools For Windows
 - How To Make Hacking Tools
 - Pentest Tools Open Source
 - Hack Tools For Pc
 - Hacking Tools Name
 - Pentest Tools Bluekeep
 - Hack Tools Github
 - Hacker Security Tools
 - Hacking Tools Free Download
 - Hacker
 - Hacking Tools Name
 - Hack Apps
 - Hacker Tools Free Download
 - Hack Tools
 - Beginner Hacker Tools
 - Free Pentest Tools For Windows
 - Hacking Tools Github
 - Top Pentest Tools
 - Termux Hacking Tools 2019
 - Hacker Tools
 - Hacker Techniques Tools And Incident Handling
 - Hacking Tools Hardware
 - Hack Tools Download
 - Underground Hacker Sites
 - Best Hacking Tools 2019
 - Hacking Tools Github
 - Hacker Tools Apk
 - Hack Tools For Mac
 - Hack Tools For Mac
 - Hacking Tools For Windows Free Download
 - Easy Hack Tools
 - Easy Hack Tools
 - Hacker Hardware Tools
 - Pentest Tools Free
 - Black Hat Hacker Tools
 - Hacking Tools For Kali Linux
 - Hack Tool Apk
 - Hacking Tools And Software
 - Hacking Tools Software
 - Hacker Tools Free
 - Hack Tools Mac
 - Hacking Tools Name
 - Pentest Tools Nmap
 - Hack Tools For Games
 - Hacker Tools For Windows
 - Hack Tools Github
 - Pentest Tools For Windows
 - What Are Hacking Tools
 - Hacking Tools Pc
 - Kik Hack Tools
 - Pentest Tools Online
 - Hacking Tools Kit
 - Pentest Tools Kali Linux
 - Best Hacking Tools 2020
 - Black Hat Hacker Tools
 





No comments:
Post a Comment