This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
session:05 [2020/06/17 23:25] Rareş-Mihail VISALOM (67101) |
session:05 [2020/07/19 12:49] (current) |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | = 0x04. Dynamic Analysis | + | ====== 0x04. Dynamic Analysis |
- | == Resources | + | ===== Resources |
[[https:// | [[https:// | ||
- | [[https:// | + | /*[[https:// |
- | [[https:// | + | /*[[https:// |
- | == Tutorials | + | Get the tasks by cloning [[https:// |
+ | |||
+ | ===== Tutorials | ||
<note warning> | <note warning> | ||
- | The current session | + | In the current session |
- | </ | + | |
- | The first part of this session will give you a walkthrough of the most common | + | To brush up on the GDB basics, read [[session:04-gdb]]. |
+ | </ | ||
+ | The first part of this session will give you a walkthrough of the most common GDB principles that we are going to use in exploitation. We are going to use these concepts in practice to evade a basic key evaluation program. | ||
Let's get to it! | Let's get to it! | ||
- | === Before GDB | + | ==== Before GDB ==== |
One thing you should always do before firing up GDB is to try to learn all the available information on the executable you're trying to debug through the techniques that have been presented so far. | One thing you should always do before firing up GDB is to try to learn all the available information on the executable you're trying to debug through the techniques that have been presented so far. | ||
Line 28: | Line 31: | ||
</ | </ | ||
- | === GDB Basic Commands | + | ==== GDB Basic Commands ==== |
- | ==== Getting help with GDB | + | === Getting help with GDB === |
Whenever you want to find out more information about GDB commands feel free to search for it inside [[http:// | Whenever you want to find out more information about GDB commands feel free to search for it inside [[http:// | ||
Line 44: | Line 47: | ||
</ | </ | ||
- | ==== Opening a program with GDB | + | === Opening a program with GDB === |
A program can be opened for debugging in a number of ways. | A program can be opened for debugging in a number of ways. | ||
Line 63: | Line 66: | ||
</ | </ | ||
- | ==== Disassembling | + | === Disassembling |
GDB allows disassembling of binary code using the '' | GDB allows disassembling of binary code using the '' | ||
Line 89: | Line 92: | ||
</ | </ | ||
- | ==== Adding Breakpoints | + | === Adding Breakpoints |
Breakpoints are important to suspend the execution of the program being debugged in a certain place. Adding breakpoints is done with the '' | Breakpoints are important to suspend the execution of the program being debugged in a certain place. Adding breakpoints is done with the '' | ||
Line 112: | Line 115: | ||
</ | </ | ||
- | ==== Listing Breakpoints | + | === Listing Breakpoints |
At any given time all the breakpoints in the program can be displayed using the '' | At any given time all the breakpoints in the program can be displayed using the '' | ||
Line 126: | Line 129: | ||
</ | </ | ||
- | ==== Deleting Breakpoints | + | === Deleting Breakpoints |
Breakpoints can be removed by issuing the '' | Breakpoints can be removed by issuing the '' | ||
Line 145: | Line 148: | ||
</ | </ | ||
- | ==== Execution flow | + | === Execution flow === |
Execution flow can be controlled in GDB using the '' | Execution flow can be controlled in GDB using the '' | ||
Line 196: | Line 199: | ||
</ | </ | ||
- | === Examine and Print, your most powerful tools | + | ==== Examine and Print, your most powerful tools ==== |
GDB allows examining of memory locations be them specified as addresses or stored in registers. The '' | GDB allows examining of memory locations be them specified as addresses or stored in registers. The '' | ||
Line 279: | Line 282: | ||
</ | </ | ||
- | === GDB command file | + | ==== GDB command file ==== |
When exploiting, there are a couple of commands that you will issue periodically and doing that by hand will get cumbersome. GDB commands files will allow you to run a specific set of commands automatically after each command you issue manually. This comes in especially handy when you're stepping through a program and want to see what happens with the registers and stack after each instruction is ran, which is the main target when exploiting. | When exploiting, there are a couple of commands that you will issue periodically and doing that by hand will get cumbersome. GDB commands files will allow you to run a specific set of commands automatically after each command you issue manually. This comes in especially handy when you're stepping through a program and want to see what happens with the registers and stack after each instruction is ran, which is the main target when exploiting. | ||
Line 367: | Line 370: | ||
</ | </ | ||
- | === Using GDB to modify variables | + | ==== Using GDB to modify variables |
GDB can be used to modify variables during runtime. In the case of exploitation this comes in handy as the program can be altered at runtime with the purpose of changing the execution path to desired branches. | GDB can be used to modify variables during runtime. In the case of exploitation this comes in handy as the program can be altered at runtime with the purpose of changing the execution path to desired branches. | ||
- | === GDB PEDA | + | ==== GDB PEDA ==== |
As you can see using GDB can be cumbersome, this is why we recommend using the PEDA (//Python Exploit Development Assistance// | As you can see using GDB can be cumbersome, this is why we recommend using the PEDA (//Python Exploit Development Assistance// | ||
Line 384: | Line 387: | ||
</ | </ | ||
- | ==== PEDA Commands | + | [[https:// |
+ | |||
+ | === PEDA Commands | ||
'' | '' | ||
Line 468: | Line 473: | ||
</ | </ | ||
- | ==== Altering variables and memory with PEDA and GDB | + | === Altering variables and memory with PEDA and GDB === |
In addition to basic registers, GDB has a two extra variables which map onto some of the existing registers, as follows: | In addition to basic registers, GDB has a two extra variables which map onto some of the existing registers, as follows: | ||
- | * '' | + | |
- | * '' | + | * '' |
- | * '' | + | * '' |
In addition to these there are also two registers which can be used to view the processor state | In addition to these there are also two registers which can be used to view the processor state | ||
Line 546: | Line 551: | ||
</ | </ | ||
- | === Enough with GDB (for a while) | + | ==== Enough with GDB (for a while) |
The following section will describe the process of function calling in detail. Understanding function calling and stack operations during program execution is esential to exploitation. | The following section will describe the process of function calling in detail. Understanding function calling and stack operations during program execution is esential to exploitation. | ||
- | === The Stack | + | ==== The Stack ==== |
The stack is one of the areas of memory which gets the biggest attention in exploitation writing. | The stack is one of the areas of memory which gets the biggest attention in exploitation writing. | ||
- | ==== Stack Growth | + | === Stack Growth |
The stack grows from high memory addresses to low memory addresses. | The stack grows from high memory addresses to low memory addresses. | ||
Line 581: | Line 586: | ||
As we can see '' | As we can see '' | ||
- | ==== Frame pointers and local function variables | + | === Frame pointers and local function variables |
Whenever the processor is entering the execution for a function, a special logical container is created on the stack for that function. | Whenever the processor is entering the execution for a function, a special logical container is created on the stack for that function. | ||
Line 758: | Line 763: | ||
- The value '' | - The value '' | ||
- | ==== Function parameters | + | === Function parameters |
The stack is also used to pass in parameters to functions. | The stack is also used to pass in parameters to functions. | ||
Line 823: | Line 828: | ||
If you don't understand why the offset for the parameters starts at EBP+0x08 and not EBP follow through with the next section. | If you don't understand why the offset for the parameters starts at EBP+0x08 and not EBP follow through with the next section. | ||
- | ==== Calling functions (call and ret) | + | === Calling functions (call and ret) === |
When calling a function the callee places the return address on the stack. This address is nothing more than a bookmark so that execution can resume where it left off once the called function finishes execution. | When calling a function the callee places the return address on the stack. This address is nothing more than a bookmark so that execution can resume where it left off once the called function finishes execution. | ||
Line 844: | Line 849: | ||
{{ : | {{ : | ||
- | === Buffer Overflows | + | ==== Buffer Overflows |
Now that we have a complete overview of the stack we can step forward to stack based buffer overflows. | Now that we have a complete overview of the stack we can step forward to stack based buffer overflows. | ||
Line 854: | Line 859: | ||
{{ : | {{ : | ||
- | == Challenges | + | ===== Challenges |
- | === 01. Challenge - Explore The Simple Password Protected Bash | + | ==== 01. Challenge - Explore The Simple Password Protected Bash ==== |
Use GDB and PEDA to run the code provided in the [[https:// | Use GDB and PEDA to run the code provided in the [[https:// | ||
Line 868: | Line 873: | ||
</ | </ | ||
- | === 02. Challenge - Simple Password Protected Bash Destruction | + | ==== 02. Challenge - Simple Password Protected Bash Destruction |
What is the condition against which your input is evaluated in the executable contained in the executable '' | What is the condition against which your input is evaluated in the executable contained in the executable '' | ||
Line 876: | Line 881: | ||
The ultimate goal is to be able to craft an input for the binary so that the '' | The ultimate goal is to be able to craft an input for the binary so that the '' | ||
</ | </ | ||
- | === 03. Challenge - Buffer Overflow Bash | ||
- | Use GDB and PEDA to run the code provided in the archive. The executable gets input from the user to post to a board and is exploitable through buffer overflows. | + | ==== 03. Challenge - Domino ==== |
- | Your task is to use GDB and PEDA to run a buffer overflow attack and spawn a shell. | + | Analyse the binary, reverse engineer what it does and get a nice message back. |
- | <note tip> | + | ==== 04. Challenge - Call me ==== |
- | Gather as much info about the executable as possible through the techniques you have learnt in previous sessions. | + | |
- | Be careful about endianness. | + | Investigate the binary in '' |
- | + | ||
- | The shell can be spawned by calling code that is already existing inside the executable. | + | |
- | </ | + | |
- | + | ||
- | <note important> | + | |
- | If you are using python for payload generation, use python2 not python3. | + | |
- | </ | + | |
- | + | ||
- | === 04. Challenge - Domino | + | |
- | + | ||
- | Analize the binary, reverse engineer what it does and get a nice message back. | + | |
- | + | ||
- | === 05. Challenge - SmashTheStack01 | + | |
- | + | ||
- | Download level01 from Smash the stack and solve it using peda. Break on *main, step through the execution and figure out what it does and how to crack it. | + | |
- | + | ||
- | '' | + | |
- | + | ||
- | === 06. Challenge - Call me | + | |
- | + | ||
- | Investigate the binary in '' | + | |
<note tip> | <note tip> | ||
Line 916: | Line 898: | ||
</ | </ | ||
- | === 07. Bonus - Challenge - Lucky Number | + | ==== 05. Challenge - Snooze Me ==== |
- | Investigate the binary | + | I wrote a simple |
- | <note tip> | + | ==== 06. Challenge - Phone Home ==== |
- | What uncalled functions are interesting? | + | |
- | </ | + | |
- | <note tip> | + | To protect their confidential data from those snooping cloud providers, |
- | The key is a continuous 16 bytes area in the executable. | + | |
- | </note> | + | |
+ | Unfortunately, |