This outta be large enough right?
Description
Come in, B-Team,
We've identified an OmniFlags service that seems to be running on a satelite somewhere. We were able to get a copy of the program, and we suspect that it may be exploitable for identifying a flag. See if you can find it.
Over & out, HQ
nc srv1.2023.magpiectf.ca 6201
Too Small
We are given a chall.c
source code file
Here we can see the program makes a call to vuln()
, which creates a character buffer and takes in input to fill the buffer, then returns 0. It's clear that we want to call win()
in order to get our flag, so how shall we do that?
The code implies a buffer overflow attack
In the code chall.c
we can see a buffer of static size 56 allocated, called buf
. User input is then placed inside this buffer with gets(buf)
. However, what if the user input exceeds the size buf
was allocated for? Then those values will be stored in the next slots of memory, after the locations that were allocated by buf
, which may overwrite important information
One of these important pieces of information is the stack pointer, which points to the next instruction that the program should execute
Thus, our goal is
Overwrite the memory location the stack pointer is currently pointing to
Change it so it points at
win
Profit.
First let's make the local executable chall
executable by setting permissions
Then let's run it with gdb using gdb chall
First let's look into the functions of the file
We can see that the win
function is located at 0x08048486. Let's put a pin in that for now, and run the program with run
Now, for the user input we want to overflow buf
. It doesn't matter what dummy values we use, so let's send in "A"'s until we get a segmentation fault. Since we know the buffer has size 56, let's try 100 "A"s first, which we can send in using inline Python code
We got a segmentation fault, as expected. However, what's notable is the 0x41414141 in ?? ()
response. This is telling us where the program is currently, when it received the segmentation fault, so the 0x41414141
is the stack pointer and ?? ()
is the function the program faulted at
If you have a good memory, you may recall none of the functions were even close to this location, and the function we ended at is unknown by the program
If you have a keen eye, you may notice that 0x41 is "A" in hexadecimal.
Putting these together, we can note that not only did we cause a segmentation fault, we also managed to overwrite the stack pointer with "AAAA"
Unfortunately, we want to overwrite the stack pointer with "08048486", the location of win
, so let's try finding the precise number of "A"s to send such that we cause a segmentation fault, however we do not overwrite the stack pointer
To spare the painful details, this amounts to 68 "A"s
If you wanted to, doing 69 or more "A"s will cause 41 to seep into the stack pointer from the right. The reason why it comes in from the right is because it is in little endian
So instead of 08 03 84 86 we get 86 84 04 08
We are now ready to overwrite the stack pointer with our desired location. Note that the payload needs to be in bytes, so it looks something like this
"Here is your flag:" is printed out, implying we successfully called win
Let Me In
I tried to directly pipe in my Python payload into the netcat command
Unfortunately, it didn't work as the program would just hang. I similarly tried to send the Python to a file out
and pipe in cat out | nc srv1.2023.magpiectf.ca 6201
which did not work either.
I had the correct payload, but I just couldn't send the payload in!
Eventually, I settled down and coded up a Python script to communicate with the server
Flag
magpie{0mn1_fl4g_3v3rywh3r3}
Last updated