This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
session:01 [2019/06/17 15:15] Mihai-Valentin DUMITRU (25451) [02. Tutorial - Execution tracing (ltrace and strace)] |
session:01 [2020/07/19 12:49] (current) |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | = 0x01. Exploration Tools | + | ====== 0x01. Exploration Tools ====== |
- | == Slides | + | ===== Resources ===== |
[[https:// | [[https:// | ||
- | [[https:// | + | /*[[https:// |
- | == Tutorials | + | / |
+ | |||
+ | [[https:// | ||
+ | |||
+ | |||
+ | / | ||
+ | |||
+ | ===== Tutorials | ||
When faced with a binary with no source or parts of the source missing you can infer some of its functionalities based upon some basic reconnaisance techniques using various tools. | When faced with a binary with no source or parts of the source missing you can infer some of its functionalities based upon some basic reconnaisance techniques using various tools. | ||
- | === 01. Tutorial - Poor man's technique: strings | + | ==== 01. Tutorial - Poor man's technique: strings |
The simplest recon technique is to dump the ASCII (or Unicode) text from a binary. It doesn' | The simplest recon technique is to dump the ASCII (or Unicode) text from a binary. It doesn' | ||
Line 62: | Line 69: | ||
</ | </ | ||
- | === 02. Tutorial - Execution tracing (ltrace and strace) | + | ==== 02. Tutorial - Execution tracing (ltrace and strace) |
[[http:// | [[http:// | ||
Line 117: | Line 124: | ||
The '' | The '' | ||
- | === 03. Tutorial - Symbols: nm | + | ==== 03. Tutorial - Symbols: nm ==== |
Symbols are basically tags/ | Symbols are basically tags/ | ||
Line 245: | Line 252: | ||
Dealing with stripped binaries (or worse, statically linked binaries that have been stripped) is harder but can still be done. We'll see how in a future lab. | Dealing with stripped binaries (or worse, statically linked binaries that have been stripped) is harder but can still be done. We'll see how in a future lab. | ||
- | === 04. Tutorial - Library dependencies | + | ==== 04. Tutorial - Library dependencies |
Most programs you will see make use of existing functionality. You don't want to always reimplement string functions or file functions. Therefore, most programs use dynamic libraries. These shared objects, as they are called alternatively, | Most programs you will see make use of existing functionality. You don't want to always reimplement string functions or file functions. Therefore, most programs use dynamic libraries. These shared objects, as they are called alternatively, | ||
Line 363: | Line 370: | ||
As you can see, functions like '' | As you can see, functions like '' | ||
- | ==== Library Wrapper Task | + | === Library Wrapper Task === |
You've previously solved '' | You've previously solved '' | ||
Line 380: | Line 387: | ||
</ | </ | ||
- | === 05. Tutorial - Network: netstat and netcat | + | ==== 05. Tutorial - Network: netstat and netcat |
Services running on remote machines offer a gateway to those particular machines. Whether it's improper handling of the data received from clients, or a flaw in the protocol used between server and clients, certain privileges can be obtained if care is not taken. We'll explore some tools and approaches to analyzing remote services. To follow along, use the server and client programs in the crackme5 folder of the {{: | Services running on remote machines offer a gateway to those particular machines. Whether it's improper handling of the data received from clients, or a flaw in the protocol used between server and clients, certain privileges can be obtained if care is not taken. We'll explore some tools and approaches to analyzing remote services. To follow along, use the server and client programs in the crackme5 folder of the {{: | ||
Line 444: | Line 451: | ||
We can see what the server and client are exchanging at an application level by capturing the traffic with the [[http:// | We can see what the server and client are exchanging at an application level by capturing the traffic with the [[http:// | ||
- | < | + | < |
# tcpdump -i any -w crackme5.pcap 'port 31337' | # tcpdump -i any -w crackme5.pcap 'port 31337' | ||
tcpdump: listening on any, link-type LINUX_SLL (Linux cooked), capture size 65535 bytes | tcpdump: listening on any, link-type LINUX_SLL (Linux cooked), capture size 65535 bytes | ||
Line 461: | Line 468: | ||
</ | </ | ||
- | < | + | < |
# netcat localhost 31337 | # netcat localhost 31337 | ||
Welcome to the awesome server. | Welcome to the awesome server. | ||
Line 471: | Line 478: | ||
</ | </ | ||
- | ==== Doing It in Python | + | === Doing It in Python |
You can create a sever and a client in Python only. We can use the '' | You can create a sever and a client in Python only. We can use the '' | ||
Line 502: | Line 509: | ||
</ | </ | ||
- | ==== Doing It Only with netcat | + | === Doing It Only with netcat |
We can still simulate a network connection using '' | We can still simulate a network connection using '' | ||
Line 549: | Line 556: | ||
</ | </ | ||
- | === 06. Tutorial - Open files | + | ==== 06. Tutorial - Open files ==== |
Let's remember how files and programs relate in Linux. | Let's remember how files and programs relate in Linux. | ||
Line 636: | Line 643: | ||
- | === Misc | + | ==== Misc ==== |
There are other sources of information available about running processes if you prefer to do things by hand such as: | There are other sources of information available about running processes if you prefer to do things by hand such as: | ||
Line 646: | Line 653: | ||
* ''/ | * ''/ | ||
- | == Challenges | + | ===== Challenges |
- | === 07. Challenge - Perfect Answer | + | ==== 07. Challenge - Perfect Answer |
For this task use the '' | For this task use the '' | ||
Line 654: | Line 661: | ||
Can you find the flag? | Can you find the flag? | ||
- | === 08. Challenge - Lots of strings | + | ==== 08. Challenge - Lots of strings |
Use the '' | Use the '' | ||
Line 663: | Line 670: | ||
Hint: use the tools presented in the tutorials. | Hint: use the tools presented in the tutorials. | ||
</ | </ | ||
- | === 09. Challenge - Sleepy cats | + | ==== 09. Challenge - Sleepy cats ==== |
For this task use the '' | For this task use the '' | ||
Line 675: | Line 682: | ||
</ | </ | ||
- | === 10. Challenge - Hidden | + | ==== 10. Challenge - Hidden |
For this challenge use the '' | For this challenge use the '' | ||
Line 685: | Line 692: | ||
</ | </ | ||
- | === 11. Challenge - Detective | + | ==== 11. Challenge - Detective |
- | This challenge | + | This challenge |
Investigate the '' | Investigate the '' | ||
Line 697: | Line 704: | ||
</ | </ | ||
- | ==== Bonus: Get the Second Flag | + | === Bonus: Get the Second Flag === |
You can actually exploit the remote '' | You can actually exploit the remote '' | ||
Line 707: | Line 714: | ||
</ | </ | ||
</ | </ | ||
- | === Extra | + | ==== Extra ==== |
If you want some more, have a go at the bonus task included in the task archive. It is a simplified CTF task that you should be able to solve using the information learned in this lab. | If you want some more, have a go at the bonus task included in the task archive. It is a simplified CTF task that you should be able to solve using the information learned in this lab. | ||
Line 713: | Line 720: | ||
Hint: This executable needs elevated permissions (run with '' | Hint: This executable needs elevated permissions (run with '' | ||
</ | </ | ||
+ | |||
+ | ==== Further pwning ==== | ||
+ | |||
+ | [[http:// | ||
+ |