MS+Office漏洞挖掘与利用技术研究

上传人:油条 文档编号:35212883 上传时间:2018-03-11 格式:PDF 页数:68 大小:985.62KB
返回 下载 相关 举报
MS+Office漏洞挖掘与利用技术研究_第1页
第1页 / 共68页
MS+Office漏洞挖掘与利用技术研究_第2页
第2页 / 共68页
MS+Office漏洞挖掘与利用技术研究_第3页
第3页 / 共68页
MS+Office漏洞挖掘与利用技术研究_第4页
第4页 / 共68页
MS+Office漏洞挖掘与利用技术研究_第5页
第5页 / 共68页
点击查看更多>>
资源描述

《MS+Office漏洞挖掘与利用技术研究》由会员分享,可在线阅读,更多相关《MS+Office漏洞挖掘与利用技术研究(68页珍藏版)》请在金锄头文库上搜索。

1、 5MS Office Office Office Office Office Office excel word powerpoint OLE2 Office Office Office Fuzz Windows Office 6 excel powerpoint Fuzz 7 RESEARCHES ON TECHNIQUES OF EXPLOITING AND APPLYING MS OFFICE VULNERABILITIES ABSTRACT As Microsoft Office documents are widely used in desktop systems, the se

2、curity of these applications is widely concerned and considered by security keepers and also attackers home and abroad. Attacks range from primitive micro viruses to present vulnerability exploiting against document form analysis. Foreign security corporations, organizations and independent attacker

3、s lay their emphases of vulnerability researches on Microsoft Office applications. Recently Office vulnerabilities are often exposed for they are exploited and used too frequently. So Microsoft Corporation now makes a faster reaction in announcing Office security announcement and publishing patches

4、against the increasing vulnerabilities. OLE2-based compound document structure is used in excel word powerpoint of MS Office applications. Multiple data forms are allowed in this structure. As a result the security of Office documents is mainly threatened in the following three aspects: micro-based

5、attacks, leak of private and hidden information, and applications vulnerability-based attacks. This thesis is focused on the techniques of exploiting and using MS Office applications vulnerabilities. Vulnerability researches consist of vulnerability exploiting and vulnerability analysis. Vulnerabili

6、ty exploiting is to find potential unknown vulnerabilities of software by various techniques and tools. Vulnerability analysis is to analyze further the known vulnerability to figure out their causes with the aim to offer technical support for exploiting or saving them. This thesis is arranged to ex

7、plain the basis principles of traditional vulnerability technique researches and their limitations. A new technique of exploiting vulnerability, based on document analysis, and its design resolutions for engineering 8 accomplishment is discussed for a certain Office application. It is a combination

8、of Fuzz test and binary code analysis is introduced and can substantially improve the real applying value of vulnerability exploiting technique. Our solutions for vulnerability exploiting is first to test file-creating modules analysis for the form of document inputted in the template document, find

9、 sensitive data in the document, modify document data according to designed modifying mode and create test document. And then dynamically supervise the debugging interfaces used by the module and start Office process. On one hand, supervise and record running of the code in question in the running process of the program, and on the other hand record and handle the exceptional information of the program. Finally, manually test and analyze the created exceptional document to find out the cause of the vulnerability with the aim to find the vulnerability can be used to

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 行业资料 > 其它行业文档

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号