Welcome to RainFall
π Rainfall: Level 1 - Exploiting Buffer Overflow π₯
Welcome to the walkthrough of Level 1 of the Rainfall project! Letβs dive into exploiting the buffer overflow vulnerability in the provided binary.
π Login and Setup
First, log into the Rainfall machine using the username level01
and the flag you obtained from level0.
π οΈ Disassembling the Binary
To disassemble the binary with a sweat view π , you can use the following command:
1 | set disassembly-flavor intel |
This command displays the disassembled code using Intel syntax π₯οΈ, instead of AT&T.
Personally, I prefer Intel syntax for better readability! π»
π Listing Functions in the Binary
You can list all functions in the binary by using the info functions
command in GDB:
1 | (gdb) info functions |
π Binary and Symbol Resolution
As you can see, there are several functions listed. Also, you can observe that the binary uses the GOT (Global Offset Table) / PLT (Procedure Linkage Table) to resolve symbols dynamically. This helps in resolving function addresses during runtime. π οΈ
π§ Disassembling the main Function
Next, letβs disassemble the main
function to inspect the code:
1 | (gdb) disassemble main |
π§ Analysis of the Assembly Code
As you can see, a buffer is allocated at runtime on the stack. The 0x50 value is 80 in decimal format, meaning a buffer of 80 bytes is allocated.
You can also observe a call to the gets function. As we know, the gets function is vulnerable because it does not check the size of the buffer passed as the first argument, which can lead to buffer overflows. π₯
π οΈ Understand the Instructions
After the call to the gets function, we encounter two instructions: leave and ret.
- The leave instruction can be replaced by pop ebp.
- The ret instruction can be replaced by pop eip.
π§ͺ Sending 256 Bytes to the Binary
Now, letβs experiment by sending 256 bytes to the binary:
1 | (gdb) run < <(python -c "print('A'*0x100)") |
β οΈ Segmentation Fault
As you can see, the program segfaults after we send too many bytes (256 in this case).
- The SIGSEGV (Segmentation fault) occurs because we tried to overflow the buffer with more data than the allocated space can handle. The address 0x41414141 is just a representation of the ASCII character βAβ, which is what we sent as input.
π Finding Padding to Overwrite the EIP Register
Next, the goal is to find the correct padding to overwrite the EIP (Extented Instruction Pointer) register. This is typically a step in a buffer overflow exploit, where we need to fill the buffer until we reach the return address stored in the stack, allowing us to redirect the programβs flow. π
π§ Understanding the EIP Register
If youβre not familiar with the EIP register (Extended Instruction Pointer), itβs the register used by the CPU to determine which instruction will be executed next at runtime. The EIP stores the address of the next instruction to be fetched and executed.
π Finding Padding to Overwrite the EIP
To find the padding required to overwrite the saved EIP, you can place a breakpoint at the gets@plt call. Hereβs how you do it in gdb:
1 | (gdb) disassemble main |
You can see that the function gets is called and then the program proceeds to leave and ret, which are the instructions we can potentially manipulate.
π§ Inspecting the Stack
Now, letβs examine the stack to find the exact padding:
1 | (gdb) x/x $eax |
- $eax points to 0x080484a0, which is the address of the next instruction.
- We can see the saved EIP in the frame at address 0xbffff73c.
𧩠Calculating the Padding
To calculate the padding, we compare the addresses of the saved EIP and the address at $esp + 0x10
:
1 | (gdb) x/x $esp+0x10 |
From the above, we can see that there are 76 bytes of padding before we can overwrite the saved EIP register.
π₯ Exploit Preparation: Overwriting the EIP
First, we send an input that overflows the buffer and overwrites the saved EIP register:
1 | run < <(python -c "print('A'*76+'B'*4)") |
In this case, A*76
fills the buffer, and B*4
overwrites the saved EIP (which was the return address after the call to gets).
After running this, we disassemble the main function:
1 | (gdb) disassemble main |
Here we see that the gets function is called. By supplying an input larger than the buffer, we overwrite the saved EIP with 0x42424242, the value corresponding to the 4-byte B sequence. After this, we proceed with the next instruction using the ni (next instruction) command:
1 | (gdb) ni |
As we can see, the saved EIP is now 0x42424242, which means the program will now jump to this address when it executes the ret instruction. This is because the EIP holds the address of the next instruction to execute, and by modifying it, we can control the flow of the program.
𧳠Running the Function: System Exploit
To trigger the exploit, we need to control the programβs execution flow to call the system()
function, which can execute a shell command.
The run
function is responsible for invoking system()
:
1 | 0x08048444 <+0>: push ebp |
The system@plt
function is a wrapper for the execve()
system call, which is used to execute shell commands.
π― The Exploit: Redirecting Execution
To exploit this vulnerability, you need to overwrite the EIP with the address of the run function. The CPU reads memory in little-endian format, so you need to place the address in little-endian order (reversed byte order).
Once the EIP is set to the address of run, it will execute the function, which calls system(), and from there, you can control what command is executed.
1 | #!/usr/bin/env python3 |
π Key Concepts to Remember
- GOT/PLT: The Global Offset Table (GOT) and Procedure Linkage Table (PLT) are used for dynamic linking. The binary uses them to resolve function addresses at runtime, allowing for greater flexibility.
- EIP: The Instruction Pointer register determines which instruction the CPU will execute next. Overwriting it allows you to control the programβs flow.