This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
session:05 [2018/06/26 19:39] Razvan Deaconescu [06. Challenge - Call me] |
session:05 [2020/07/19 12:49] (current) |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | = 0x05. Dynamic Analysis | + | ====== 0x04. Dynamic Analysis |
- | == Slides | + | ===== Resources ===== |
- | Slides are available {{:session: | + | [[https:// |
- | Challenges archive is at [[https:// | + | /*[[https:// |
- | == Tutorials | + | / |
+ | |||
+ | Get the tasks by cloning [[https:// | ||
+ | |||
+ | ===== Tutorials | ||
<note warning> | <note warning> | ||
- | The current session | + | In the current session |
- | </ | + | |
- | The first part of this session will give you a walkthrough of the most common | + | To brush up on the GDB basics, read [[session:04-gdb]]. |
+ | </ | ||
+ | The first part of this session will give you a walkthrough of the most common GDB principles that we are going to use in exploitation. We are going to use these concepts in practice to evade a basic key evaluation program. | ||
Let's get to it! | Let's get to it! | ||
- | === Before GDB | + | ==== Before GDB ==== |
One thing you should always do before firing up GDB is to try to learn all the available information on the executable you're trying to debug through the techniques that have been presented so far. | One thing you should always do before firing up GDB is to try to learn all the available information on the executable you're trying to debug through the techniques that have been presented so far. | ||
Line 26: | Line 31: | ||
</ | </ | ||
- | === GDB Basic Commands | + | ==== GDB Basic Commands ==== |
- | ==== Getting help with GDB | + | === Getting help with GDB === |
Whenever you want to find out more information about GDB commands feel free to search for it inside [[http:// | Whenever you want to find out more information about GDB commands feel free to search for it inside [[http:// | ||
Line 42: | Line 47: | ||
</ | </ | ||
- | ==== Opening a program with GDB | + | === Opening a program with GDB === |
A program can be opened for debugging in a number of ways. | A program can be opened for debugging in a number of ways. | ||
Line 56: | Line 61: | ||
</ | </ | ||
- | Furthermore we can attach GDB to a running service if we know it' | + | Furthermore we can attach GDB to a running service if we know its process id: |
<code bash> | <code bash> | ||
$ gdb --pid [pid_number] | $ gdb --pid [pid_number] | ||
</ | </ | ||
- | ==== Disassembling | + | === Disassembling |
- | GDB allows disassembling of binary code using the '' | + | GDB allows disassembling of binary code using the '' |
<code bash> | <code bash> | ||
(gdb) disas *main | (gdb) disas *main | ||
Line 87: | Line 92: | ||
</ | </ | ||
- | ==== Adding Breakpoints | + | === Adding Breakpoints |
Breakpoints are important to suspend the execution of the program being debugged in a certain place. Adding breakpoints is done with the '' | Breakpoints are important to suspend the execution of the program being debugged in a certain place. Adding breakpoints is done with the '' | ||
Line 110: | Line 115: | ||
</ | </ | ||
- | ==== Listing Breakpoints | + | === Listing Breakpoints |
At any given time all the breakpoints in the program can be displayed using the '' | At any given time all the breakpoints in the program can be displayed using the '' | ||
Line 124: | Line 129: | ||
</ | </ | ||
- | ==== Deleting Breakpoints | + | === Deleting Breakpoints |
Breakpoints can be removed by issuing the '' | Breakpoints can be removed by issuing the '' | ||
Line 143: | Line 148: | ||
</ | </ | ||
- | ==== Execution flow | + | === Execution flow === |
Execution flow can be controlled in GDB using the '' | Execution flow can be controlled in GDB using the '' | ||
Line 194: | Line 199: | ||
</ | </ | ||
- | === Examine and Print, your most powerful tools | + | ==== Examine and Print, your most powerful tools ==== |
GDB allows examining of memory locations be them specified as addresses or stored in registers. The '' | GDB allows examining of memory locations be them specified as addresses or stored in registers. The '' | ||
Line 277: | Line 282: | ||
</ | </ | ||
- | === GDB command file | + | ==== GDB command file ==== |
When exploiting, there are a couple of commands that you will issue periodically and doing that by hand will get cumbersome. GDB commands files will allow you to run a specific set of commands automatically after each command you issue manually. This comes in especially handy when you're stepping through a program and want to see what happens with the registers and stack after each instruction is ran, which is the main target when exploiting. | When exploiting, there are a couple of commands that you will issue periodically and doing that by hand will get cumbersome. GDB commands files will allow you to run a specific set of commands automatically after each command you issue manually. This comes in especially handy when you're stepping through a program and want to see what happens with the registers and stack after each instruction is ran, which is the main target when exploiting. | ||
Line 365: | Line 370: | ||
</ | </ | ||
- | === Using GDB to modify variables | + | ==== Using GDB to modify variables |
GDB can be used to modify variables during runtime. In the case of exploitation this comes in handy as the program can be altered at runtime with the purpose of changing the execution path to desired branches. | GDB can be used to modify variables during runtime. In the case of exploitation this comes in handy as the program can be altered at runtime with the purpose of changing the execution path to desired branches. | ||
- | === GDB PEDA | + | ==== GDB PEDA ==== |
As you can see using GDB can be cumbersome, this is why we recommend using the PEDA (//Python Exploit Development Assistance// | As you can see using GDB can be cumbersome, this is why we recommend using the PEDA (//Python Exploit Development Assistance// | ||
Line 382: | Line 387: | ||
</ | </ | ||
- | ==== PEDA Commands | + | [[https:// |
+ | |||
+ | === PEDA Commands | ||
'' | '' | ||
Line 466: | Line 473: | ||
</ | </ | ||
- | ==== Altering variables and memory with PEDA and GDB | + | === Altering variables and memory with PEDA and GDB === |
In addition to basic registers, GDB has a two extra variables which map onto some of the existing registers, as follows: | In addition to basic registers, GDB has a two extra variables which map onto some of the existing registers, as follows: | ||
- | * '' | + | |
- | * '' | + | * '' |
- | * '' | + | * '' |
In addition to these there are also two registers which can be used to view the processor state | In addition to these there are also two registers which can be used to view the processor state | ||
Line 496: | Line 503: | ||
<note tip> | <note tip> | ||
- | Notice that the flags that are sent are printed in all-caps when the '' | + | Notice that the flags that are set are printed in all-caps when the '' |
</ | </ | ||
Line 536: | Line 543: | ||
PEDA does not offer enhancements in modifying registry values. For modifying registry values you can use the GDB '' | PEDA does not offer enhancements in modifying registry values. For modifying registry values you can use the GDB '' | ||
- | < | + | < |
gdb-peda$ p/x $eax | gdb-peda$ p/x $eax | ||
$10 = 0x1 | $10 = 0x1 | ||
Line 544: | Line 551: | ||
</ | </ | ||
- | === Enough with GDB (for a while) | + | ==== Enough with GDB (for a while) |
The following section will describe the process of function calling in detail. Understanding function calling and stack operations during program execution is esential to exploitation. | The following section will describe the process of function calling in detail. Understanding function calling and stack operations during program execution is esential to exploitation. | ||
- | === The Stack | + | ==== The Stack ==== |
- | The stack is one of the areas of memory which get' | + | The stack is one of the areas of memory which gets the biggest attention in exploitation writing. |
- | ==== Stack Growth | + | === Stack Growth |
The stack grows from high memory addresses to low memory addresses. | The stack grows from high memory addresses to low memory addresses. | ||
Line 579: | Line 586: | ||
As we can see '' | As we can see '' | ||
- | ==== Frame pointers and local function variables | + | === Frame pointers and local function variables |
Whenever the processor is entering the execution for a function, a special logical container is created on the stack for that function. | Whenever the processor is entering the execution for a function, a special logical container is created on the stack for that function. | ||
Line 668: | Line 675: | ||
We then set a breakpoint for another function called '' | We then set a breakpoint for another function called '' | ||
- | The two instruction | + | The two instructions |
In essence what they do is save the reference of the old container ('' | In essence what they do is save the reference of the old container ('' | ||
Line 678: | Line 685: | ||
As you can see the EBP register always points to the stack address that corresponds to the beginning of the current function' | As you can see the EBP register always points to the stack address that corresponds to the beginning of the current function' | ||
- | In addition to the two instructions required for creating a new stack frame for a function. There are a couple more instructions that you will usually see at the beginning of a function | + | In addition to the two instructions required for creating a new stack frame for a function, there are a couple more instructions that you will usually see at the beginning of a function |
If you analyze the instructions at the beginning of main, you can spot these as being: | If you analyze the instructions at the beginning of main, you can spot these as being: | ||
Line 756: | Line 763: | ||
- The value '' | - The value '' | ||
- | ==== Function parameters | + | === Function parameters |
The stack is also used to pass in parameters to functions. | The stack is also used to pass in parameters to functions. | ||
Line 821: | Line 828: | ||
If you don't understand why the offset for the parameters starts at EBP+0x08 and not EBP follow through with the next section. | If you don't understand why the offset for the parameters starts at EBP+0x08 and not EBP follow through with the next section. | ||
- | ==== Calling functions (call and ret) | + | === Calling functions (call and ret) === |
- | When calling a function the callee | + | When calling a function the callee |
The last instruction in functions is usually a '' | The last instruction in functions is usually a '' | ||
Line 842: | Line 849: | ||
{{ : | {{ : | ||
- | === Buffer Overflows | + | ==== Buffer Overflows |
Now that we have a complete overview of the stack we can step forward to stack based buffer overflows. | Now that we have a complete overview of the stack we can step forward to stack based buffer overflows. | ||
- | A buffer overflow takes place when there is a lack of checking regarding boundaries and usually result in complete control of the program' | + | A buffer overflow takes place when there is a lack of checking regarding boundaries and usually result in complete control of the program' |
A typical example of buffer overflows can be seen in the following picture: | A typical example of buffer overflows can be seen in the following picture: | ||
Line 852: | Line 859: | ||
{{ : | {{ : | ||
- | == Challenges | + | ===== Challenges |
- | === 01. Challenge - Explore The Simple Password Protected Bash | + | ==== 01. Challenge - Explore The Simple Password Protected Bash ==== |
Use GDB and PEDA to run the code provided in the [[https:// | Use GDB and PEDA to run the code provided in the [[https:// | ||
Line 866: | Line 873: | ||
</ | </ | ||
- | === 02. Challenge - Simple Password Protected Bash Destruction | + | ==== 02. Challenge - Simple Password Protected Bash Destruction |
- | What is the condition against which your input is evaluated in the executable contained in the [[https:// | + | What is the condition against which your input is evaluated in the executable contained in the executable '' |
Line 874: | Line 881: | ||
The ultimate goal is to be able to craft an input for the binary so that the '' | The ultimate goal is to be able to craft an input for the binary so that the '' | ||
</ | </ | ||
- | === 03. Challenge - Buffer Overflow Bash | ||
- | Use GDB and PEDA to run the code provided in the [[https:// | + | ==== 03. Challenge |
- | Your task is to use GDB and PEDA to run a buffer overflow attack and spawn a shell. | + | Analyse the binary, reverse engineer what it does and get a nice message back. |
- | <note tip> | + | ==== 04. Challenge - Call me ==== |
- | Gather as much info about the executable as possible through the techniques you have learnt in previous sessions. | + | |
- | Be careful about endianness. | + | Investigate the binary in '' |
- | The shell can be spawned by calling code that is already existing inside the executable. | + | <note tip> |
+ | There is something hidden you can toy around with. | ||
</ | </ | ||
- | < | + | < |
- | If you are using python for payload generation, use python2 not python3. | + | The challenge name is a hint. |
</ | </ | ||
- | === 04. Challenge - Domino | + | ==== 05. Challenge - Snooze Me ==== |
- | Analize the binary, | + | I wrote a simple |
- | === 05. Challenge - SmashTheStack01 | + | |
- | Download level01 from Smash the stack and solve it using peda. Break on *main, step through the execution and figure out what it does and how to crack it. | + | ==== 06. Challenge - Phone Home ==== |
- | '' | + | To protect their confidential data from those snooping cloud providers, the authors of '' |
- | === 06. Challenge - Call me | + | Unfortunately, |
- | + | ||
- | Investigate | + | |
- | + | ||
- | <note tip> | + | |
- | There is something hidden you can toy around with. | + | |
- | </ | + | |
- | + | ||
- | <note tip> | + | |
- | The challenge name is a hint. | + | |
- | </ | + |