Playbook
Calculating Padding Length
Used in buffer overflow attacks.
Setting up a buffer overflow attack requires padding the available buffer and overwriting the return address to redirect the execution flow.
The steps are as follows:
- Set a breakpoint after the critical call to
read()
- Find the buffer starting address: Provide a cyclic pattern that is unique enough to find in memory as input to the program. This can be done manually or generated with a function like
pwntools.cyclic(10)
. - Search for the pattern: Using the
pwndbg
commandsearch <pattern>
- Get the address of RBP and calculate the distance: Using
info frame
anddistance <pattern address> <RBP address>
Example:
Important
The measured distance is the distance between the start of the buffer and the function base pointer (RBP). The return address is stored in the stack pointer (RSP) located at RBP + 8. This means the payload needs an additional 8 bytes of padding to overwrite RBP before reaching the return address. In the above example, this corresponds to 0x28 (40) bytes of padding.