Shellcoding

Introduction

//Example code
void bye1() { 	puts("Goodbye!"); } 
void bye2() { puts("Farewell!");}
void hello(char *name, void (*bye_func)())
{   printf("Hello %s!\\n", name);
    bye_func();}
int main(int argc, char **argv)
{
    char name[1024];
    gets(name);
    srand(time(0));
    if (rand() % 2)
        hello(bye1, name);
    else
        hello(name, bye2);
}

Untitled

Putting data into our code

;;Data section
.string "HELLO"                    ;;"HELLO\\0"
.byte 0x48, 0x45, 0x4C, 0x4C, 0x4F ;;"HELLO"

;;Other technique
mov RBX, 0x0068732f6e69622f ;;Moving "/bin/sh" into RBX (little endian)
push RBX
mov RDI, RSP

;;Another technique
;;mov RBX, 0x00000067616C662F ;;/flag in little endian format
mov RBX, 0x67616c66
SHL RBX, 8
mov BL, 0x2F
push RBX

Untitled

Untitled

Extracting shellcode

#If we have an OS which runs on the architecture of the ISA we're writing shellcode against, we can use objdump
for i in $(objdump -d binary -M intel |grep "^ " |cut -f2); do echo -n '\\x'$i; done;echo

#Generic technique
gcc -nostdlib -static shellcode.asm -o shellcode-elf
objcopy --dump-section .text=shellcode-raw shellcode-elf

#Position independent
gcc -nostdlib -static-pie shellcode.o -o shellcode-elf

#MIPS
mips-linux-gnu-gcc -nostdlib -static shellcode.asm shellcode-elf
qemu-mips-static ./shellcode #debugging cross platform shellcode, -strace

Shellcode delivery

Testing our shellcode

We can debug our shellcode with strace() and gdb

//gcc -fno-stack-protector -z execstack shellcode.c -ggdb -o shellcode
// Shellcode testing skeleton
#include <stdio.h>
#include <string.h>

unsigned char shellcode[] = "shellcode!";

int (*ret)() = (int (*)())shellcode;

void main(void)
{
    printf("Shellcode length: %d\\n", (int)strlen(shellcode));
}
//Shellcode delivery
//Both will do the same thing, but the latter one will not waste too 64-bytes
mov RAX, 1
MOV AL, 1 

Forbidden bytes

;;if the int3 opcode is forbidden, but memory region is writable
inc BYTE PTR [rip]
.byte 0xcb ;;int3
;;Making sure the memory where our shellcode is mapped to, is writable
gcc -Wl,-N --static -nostdlib -o test shellcode 
;;multi-staged loading
lea RAX, [RIP]
read(0, rax, 1000) ;;stage 1
;;whatever's beneath the shellcode will get overwritten with unfiltered better shellcode, which we can execute :)
;;And we'll be able to bypass all the restrictions put in place by the target program.

Untitled

DEP bypass techniques

<aside> 👉 RWX pages

</aside>

- mmap(PROT_READ | PROT_WRITE)
- Write the code
- mprotect(PROT_READ | PROT_EXEC)
- Execute the code
- mprotect(PROT_READ | PROT_WRITE)
- Update the code etc
#inside /proc
grep -l rwx */maps | parallel "ls -l {//}/exe"

<aside> 👉 De-protecting memory

</aside>

Memory protection can be messed by the help of the mprotect() syscall, and we can trick the program into mrprotect(PROT_EXEC)ing our shellcode, the most common way for which is Return Oriented Programming (ROP)

<aside> 👉 JIT Spraying

</aside>

	var evil = "%90%90%90%90%90";

Sandboxing

Introduction

<aside> 👉 History

</aside>

<aside> 👉 The need for Sandboxing

</aside>

<aside> 👉 The rise of Sandboxing

</aside>

The idea behind sandboxing is to run code that we don't trust, in extremely isolated environments with zero permissions, and for an attacker to successfully exploit a user, he/ she will have to first exploit the vulnerable process, and then exploit the sandbox to break

File-system isolation using chroot

<aside> 👉 Basics

</aside>

sudo chroot <jailDirectory> <command>

#Won't work because the meaning of / gets changed to /tmp/jail and any access to /bin/bash would actually mean /tmp/jail/bin/bash
sudo chroot /tmp/jail /bin/bash

#What we can do instead is to download a statically compiled binary of busybox, put it into /tmp/jail/ and do
sudo chroot /tmp/jail /busybox sh

<aside> 👉 Security pitfalls

</aside>