1. Overview
Is an elf32 static and stripped binary, but the good news is that it was compiled with gcc and it will not have shitty runtimes and libs to fingerprint, just the libc ... and libprhrhead
This binary is writed by Ricardo J Rodrigez
When it's executed, it seems that is computing the flag:
But this process never ends .... let's see what strace say:
There is a thread deadlock, maybe the start point can be looking in IDA the xrefs of 0x403a85
Maybe we can think about an encrypted flag that is not decrypting because of the lock.
This can be solved in two ways:
- static: understanding the cryptosystem and programming our own decryptor
- dynamic: fixing the the binary and running it (hard: antidebug, futex, rands ...)
At first sight I thought that dynamic approach were quicker, but it turned more complex than the static approach.
2. Static approach
Crawling the xrefs to the futex, it is possible to locate the main:
With libc/libpthread function fingerprinting or a bit of manual work, we have the symbols, here is the main, where 255 threads are created and joined, when the threads end, the xor key is calculated and it calls the print_flag:
The code of the thread is passed to the libc_pthread_create, IDA recognize this area as data but can be selected as code and function.
This is the thread code decompiled, where we can observe two infinite loops for ptrace detection and preload (although is static) this antidebug/antihook are easy to detect at this point.
we have to observe the important thing, is the key random?? well, with the same seed the random sequence will be the same, then the key is "hidden" in the predictability of the random.
If the threads are not executed on the creation order, the key will be wrong because is xored with the th_id which is the identify of current thread.
The print_key function, do the xor between the key and the flag_cyphertext byte by byte.
And here we have the seed and the first bytes of the cypher-text:
With radare we can convert this to a c variable quickly:
And here is the flag cyphertext:
And with some radare magics, we have the c initialized array:
radare, is full featured :)
With a bit of rand() calibration here is the solution ...
The code:
https://github.com/NocONName/CTF_NcN2k15/blob/master/theAnswer/solution.c
3. The Dynamic Approach
First we have to patch the anti-debugs, on beginning of the thread there is two evident anti-debugs (well anti preload hook and anti ptrace debugging) the infinite loop also makes the anti-debug more evident:
There are also a third anti-debug, a bit more silent, if detects a debugger trough the first available descriptor, and here comes the fucking part, don't crash the execution, the execution continues but the seed is modified a bit, then the decryption key will not be ok.
Ok, the seed is incremented by one, this could be a normal program feature, but this is only triggered if the fileno(open("/","r")) > 3 this is a well known anti-debug, that also can be seen from a traced execution.
Ok, just one byte patch, seed+=1 to seed+=0, (add eax, 1 to add eax, 0)
before:
after:
To patch the two infinite loops, just nop the two bytes of each jmp $-0
Ok, but repairing this binary is harder than building a decryptor, we need to fix more things:
- The sleep(randInt(1,3)) of the beginning of the thread to execute the threads in the correct order
- Modify the pthread_cond_wait to avoid the futex()
- We also need to calibrate de rand() to get the key (just patch the sleep and add other rand() before the pthread_create loop
Adding the extra rand() can be done with a patch because from gdb is not possible to make a call rand() in this binary.
With this modifications, the binary will print the key by itself.
Related posts
- How To Install Pentest Tools In Ubuntu
- Hack Rom Tools
- Pentest Tools For Windows
- Hacking Tools Software
- Pentest Tools Linux
- Hacking Tools Github
- Pentest Tools For Mac
- Termux Hacking Tools 2019
- Pentest Tools Nmap
- Pentest Tools Find Subdomains
- How To Hack
- Hacking Tools Kit
- Hacker Tools For Ios
- New Hack Tools
- Hacker Tools Mac
- What Are Hacking Tools
- Growth Hacker Tools
- Ethical Hacker Tools
- Hacker Search Tools
- Hacking Tools Free Download
- Pentest Tools
- Hacking Tools For Kali Linux
- Black Hat Hacker Tools
- Hacking Tools Name
- Hacker Tool Kit
- Hacking Tools Windows 10
- Hacker Tools Linux
- Bluetooth Hacking Tools Kali
- Top Pentest Tools
- Nsa Hack Tools
- New Hack Tools
- Hacker Tools Github
- Hack Tools
- Install Pentest Tools Ubuntu
- Hacking Tools Name
- Hacker Tools Online
- Hacking Tools Hardware
- Hack Tools For Windows
- Pentest Tools For Mac
- Hack Tools Mac
- Hacker Security Tools
- Hacking Tools Free Download
- Wifi Hacker Tools For Windows
- Hacker Tools Software
- Tools Used For Hacking
- Pentest Tools Android
- Pentest Tools Github
- Pentest Tools Github
- Hacker Tools Free
- Hacker Tools Apk Download
- Hacks And Tools
- New Hack Tools
- New Hack Tools
- Best Hacking Tools 2020
- Pentest Tools Url Fuzzer
- Beginner Hacker Tools
- Blackhat Hacker Tools
- Hacking Tools Mac
- Hacker Search Tools
- Hack Tools For Mac
- Hacker Tools Github
- Hacking Tools 2020
- Top Pentest Tools
- Hacking Tools For Beginners
- New Hack Tools
- Pentest Tools Alternative
- Hacker Tools
- Hack Tool Apk
- Growth Hacker Tools
- Hack Tools Mac
- Best Hacking Tools 2019
- Hacking Tools
- Hacker Tools Free
- Pentest Tools Website Vulnerability
- Hacker Tools For Ios
- Hack Apps
- How To Make Hacking Tools
- Best Hacking Tools 2019
- Hacker Tools Apk Download
- Pentest Tools Free
- New Hacker Tools
- Hak5 Tools
- Computer Hacker
- World No 1 Hacker Software
- Pentest Tools Framework
- Hack Tools Pc
- Tools For Hacker
- Hacker Tools Free
- Pentest Tools Windows
- Hacker Search Tools
- How To Hack
- Wifi Hacker Tools For Windows
- Top Pentest Tools
- Game Hacking
- What Are Hacking Tools
- Wifi Hacker Tools For Windows
- Top Pentest Tools
- Hack App
- Hacking Tools 2019
- Best Pentesting Tools 2018
- Nsa Hacker Tools
- Pentest Tools Bluekeep
- Beginner Hacker Tools
- Easy Hack Tools
- What Are Hacking Tools
- Best Hacking Tools 2020
- Usb Pentest Tools
- Pentest Automation Tools
- Beginner Hacker Tools
- Ethical Hacker Tools
- Kik Hack Tools
- Bluetooth Hacking Tools Kali
- Underground Hacker Sites
- Hacker Tools Github
- Easy Hack Tools
- Hack Tools Online
- Hacking Tools Name
- Hacker Tool Kit
- Pentest Tools Download
- Pentest Tools
- Pentest Tools Github
- Hack Tools For Games
- Hack Tools
- Hacker Tools 2019
- Hack Tools Download
- Tools Used For Hacking
- Wifi Hacker Tools For Windows
- Pentest Tools Alternative
- Hack Tools Online
- Hacks And Tools
- Pentest Tools Port Scanner
- Hacking Tools For Kali Linux
- Pentest Automation Tools
- Pentest Tools Windows
- Hack Tools Github
- Nsa Hack Tools
- Pentest Tools
- Hacking Tools Mac
- Hacking Tools
- Hacker Tools Apk
No comments:
Post a Comment