This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
session:11 [2020/07/08 11:05] Liza-Elena BABU (78556) |
session:11 [2020/07/19 12:49] (current) |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | = 0x0A: Information Leaks | + | ====== 0x0A: Information Leaks ====== |
- | == Slides | + | ===== Slides |
- | == Resources | + | ===== Resources |
- | [[https:// | + | [[https:// |
- | [[https://security.cs.pub.ro/summer-school/res/arc/10-information-leaks-skel.zip|Session' | + | [[https://github.com/hexcellents/ |
- | [[https:// | + | ===== Stack Protection (Canaries) |
- | + | ||
- | + | ||
- | == Stack Protection (Canaries) | + | |
The name comes from canaries (birds) that were used by mining workers when entering mines and were affected by any deadly gases such as methane before humans were. In our case, stack canaries are used to check if a buffer overflow of a stack variable resulted in overriding the return address. The mechanism is based on a (sometimes random) value that is placed on each function' | The name comes from canaries (birds) that were used by mining workers when entering mines and were affected by any deadly gases such as methane before humans were. In our case, stack canaries are used to check if a buffer overflow of a stack variable resulted in overriding the return address. The mechanism is based on a (sometimes random) value that is placed on each function' | ||
Line 32: | Line 29: | ||
The 3 well known implementations of stack protections are: StackGuard, ProPolice, and StackShield. | The 3 well known implementations of stack protections are: StackGuard, ProPolice, and StackShield. | ||
- | === StackGuard | + | ==== StackGuard |
The [[https:// | The [[https:// | ||
Line 40: | Line 37: | ||
</ | </ | ||
- | === StackShield | + | ==== StackShield |
The most notable feature of StackShield, | The most notable feature of StackShield, | ||
- | === ProPolice | + | ==== ProPolice |
ProPolice, proposed by IBM, started from an implementation similar to StackGuard, but evolved and introduced new features. It is currently the method used by GCC when the '' | ProPolice, proposed by IBM, started from an implementation similar to StackGuard, but evolved and introduced new features. It is currently the method used by GCC when the '' | ||
Line 117: | Line 114: | ||
</ | </ | ||
- | === Defeating Canaries | + | ==== Defeating Canaries |
This [[http:// | This [[http:// | ||
Line 136: | Line 133: | ||
- | == Format String Exploits | + | ===== Format String Exploits |
<note warning> | <note warning> | ||
Line 161: | Line 158: | ||
} | } | ||
</ | </ | ||
- | === Format functions | + | ==== Format functions |
A number of format functions are defined in the ANSI C definition. There are some basic format string functions on which more complex functions are based on, some of which are not part of the standard but are widely available. | A number of format functions are defined in the ANSI C definition. There are some basic format string functions on which more complex functions are based on, some of which are not part of the standard but are widely available. | ||
Real family members: | Real family members: | ||
Line 173: | Line 170: | ||
* vsnprintf — prints to a string with length checking from a va_arg structure | * vsnprintf — prints to a string with length checking from a va_arg structure | ||
- | ===== Relatives: | + | == Relatives: |
* setproctitle — set argv[] | * setproctitle — set argv[] | ||
* syslog — output to the syslog facility | * syslog — output to the syslog facility | ||
Line 220: | Line 217: | ||
The code above works, because ' | The code above works, because ' | ||
- | === The stack and its role at format strings | + | ==== The stack and its role at format strings |
The behaviour of the format function is controlled by the format string. The function retrieves the parameters requested by the format string from the stack. | The behaviour of the format function is controlled by the format string. The function retrieves the parameters requested by the format string from the stack. | ||
<code C> | <code C> | ||
Line 232: | Line 229: | ||
should be evaluated. The string " | should be evaluated. The string " | ||
- | === What do we control? | + | ==== What do we control? |
Through supplying the format string we are able to control the behaviour of the format function. We now have to examine what exactly we are able to control, and how to use this control to extend this partial control over | Through supplying the format string we are able to control the behaviour of the format function. We now have to examine what exactly we are able to control, and how to use this control to extend this partial control over | ||
the process to full control of the execution flow. | the process to full control of the execution flow. | ||
- | === Crash of the program | + | ==== Crash of the program |
By utilizing format strings we can easily trigger some invalid pointer access by just supplying a format string like: | By utilizing format strings we can easily trigger some invalid pointer access by just supplying a format string like: | ||
<code C> | <code C> | ||
Line 242: | Line 239: | ||
Because ' | Because ' | ||
implementations offer the ' | implementations offer the ' | ||
- | === Viewing the stack | + | ==== Viewing the stack ==== |
We can show some parts of the stack memory by using a format string like this: | We can show some parts of the stack memory by using a format string like this: | ||
<code C> | <code C> | ||
Line 253: | Line 250: | ||
This is a partial dump of the stack memory, starting from the current bottom of the stack towards the top — assuming the stack grows towards the low addresses. Depending on the size of the format string buffer and the size of the output buffer, you can reconstruct more or less large parts of the stack memory by using this technique. In some cases you can even retrieve the entire stack memory. | This is a partial dump of the stack memory, starting from the current bottom of the stack towards the top — assuming the stack grows towards the low addresses. Depending on the size of the format string buffer and the size of the output buffer, you can reconstruct more or less large parts of the stack memory by using this technique. In some cases you can even retrieve the entire stack memory. | ||
A stack dump gives important information about the program flow and local function variables and may be very helpful for finding the correct offsets for a successful exploitation. | A stack dump gives important information about the program flow and local function variables and may be very helpful for finding the correct offsets for a successful exploitation. | ||
- | === Viewing memory at any location | + | ==== Viewing memory at any location |
It is also possible to peek at memory locations different from the stack memory. To do this we have to get the format function to display memory from an address we can supply. | It is also possible to peek at memory locations different from the stack memory. To do this we have to get the format function to display memory from an address we can supply. | ||
This poses two problems to us: | This poses two problems to us: | ||
Line 295: | Line 292: | ||
This is analog to the alignment in buffer overflow exploits. | This is analog to the alignment in buffer overflow exploits. | ||
- | === Exploitation - through pure format strings | + | ==== Exploitation - through pure format strings |
Our goal in the case of exploitation is to be able to control the instruction pointer, i.e we want to extend our very limited control — the ability to control the behaviour of the format function — to real execution control, that is executing our raw machine code. | Our goal in the case of exploitation is to be able to control the instruction pointer, i.e we want to extend our very limited control — the ability to control the behaviour of the format function — to real execution control, that is executing our raw machine code. | ||
Let's take a look at the following code: | Let's take a look at the following code: | ||
Line 428: | Line 425: | ||
By ensuring our padding is always larger than 10, we can keep an always accurate number of ‘already_written’, | By ensuring our padding is always larger than 10, we can keep an always accurate number of ‘already_written’, | ||
- | === A general method to exploit format strings vulnerabilities | + | ==== A general method to exploit format strings vulnerabilities |
The only remaining thing to exploit such vulnerabilities in a hands-on practical way is to put the arguments into the right order on the stack and use a stackpop sequence to increase the stack pointer. | The only remaining thing to exploit such vulnerabilities in a hands-on practical way is to put the arguments into the right order on the stack and use a stackpop sequence to increase the stack pointer. | ||
It should look like: | It should look like: | ||
Line 440: | Line 437: | ||
The write code has to be modified to match the number of bytes written by the stackpop, since the stackpop wrote already characters to the output when the format function parses the write-code — the format function counter does not start at zero, and this has to be considered. | The write code has to be modified to match the number of bytes written by the stackpop, since the stackpop wrote already characters to the output when the format function parses the write-code — the format function counter does not start at zero, and this has to be considered. | ||
- | === Direct Parameter Access | + | ==== Direct Parameter Access |
There is a huge simplification which is known as ' | There is a huge simplification which is known as ' | ||
method to format string exploitation. | method to format string exploitation. | ||
Line 462: | Line 459: | ||
- | === Generalizing format string exploits | + | ==== Generalizing format string exploits |
The '' | The '' | ||
In general, any system where user input affects program execution and data access in a custom way can be susceptible to such a vulnerability. Other specialized examples can be considered: | In general, any system where user input affects program execution and data access in a custom way can be susceptible to such a vulnerability. Other specialized examples can be considered: | ||
* SQL injections | * SQL injections | ||
* XSS injections | * XSS injections | ||
- | == Tasks | + | ===== Tasks ===== |
- | === Stack Canaries | + | ==== Stack Canaries |
Download the archive with the tasks at the top of the page. The binaries should be fairly easy to reverse engineer. You can use any tool. | Download the archive with the tasks at the top of the page. The binaries should be fairly easy to reverse engineer. You can use any tool. | ||
- | ==== Task 1 | + | === Task 1 === |
The '' | The '' | ||
- | ==== Task 2 | + | === Task 2 === |
The '' | The '' | ||
Line 492: | Line 489: | ||
- | === Task 3 - Format Strings | + | ==== Task 3 - Format Strings |
Download the archive with the tasks at the top of the page containing 5 binaries exhibiting a format string vulnerability. Analyze what each binary does using the methods already familiar to you and try to determine the exact format string that will lead to the desired result. | Download the archive with the tasks at the top of the page containing 5 binaries exhibiting a format string vulnerability. Analyze what each binary does using the methods already familiar to you and try to determine the exact format string that will lead to the desired result. | ||
<note important> | <note important> | ||
Line 500: | Line 497: | ||
shows you the invalid address associated with a SIGSEGV signal. | shows you the invalid address associated with a SIGSEGV signal. | ||
</ | </ | ||
- | <note tip> | ||
- | In case you get stuck, please have a look at the {{: | ||
- | </ | ||
- | == References | ||
- | * [[http:// | ||
- | |||
- | === Feedback | ||
- | Your feedback is very much needed and appreciated [[https:// | ||