
SANS National CTF Tournament 2021 - Binary Hard #2
November 11, 2021
I want to share with you my solution regarding the CTF Binary Hard #2.
A binary named "program" is provided. It requests a password to provide you the flag.
You can download this binary here and have fun to reproduce this CTF if you want on your computer.
I recommand using a Linux distribution for this CTF, preferably Kali as I've worked with it to solve this CTF.
Let's start!
First thing first, a small look at this binary properties. It cannot hurt to know a little bit more about our challenger:
user@kali
:~/Documents/SANS CTF/BH02
$ file program
program: ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV),
dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.2.0,
BuildID[sha1]=16e26b9493c4785afd758485e6c448e7cd5d2df6, not stripped
OK very good! It's pretty straightforward, it's a 64-bit ELF binary, is dynamically linked, and it's NOT stripped of debugging symbols.
I'm curious to see what this binary does so let's execute it to see what's happening:
user@kali
:~/Documents/SANS CTF/BH02
$ ./program
密码是什么?
> blah
不正确的.
I was not expecting chinese, that's for sure.Deepl Translator I need you !
- 密码是什么?= What is the password?
- 不正确的. = Incorrect
Let's see how the program react with a classical attempt at buffer overflow.
user@kali
:~/Documents/SANS CTF/BH02
$ ./program
密码是什么?
> OVERFLOWOVERFLOWOVERFLOWOVERFLOWOVERFLOWOVERFLOWOVERFLOWOVERFLOW...OVERFLOW
不正确的.
Well, that's not a big success. To me it sounds like it's not the way to go...
Maybe a strings
can give us something?
user@kali
:~/Documents/SANS CTF/BH02
$ strings program
/lib64/ld-linux-x86-64.so.2
libc.so.6
puts
__stack_chk_fail
stdin
printf
fgets
__cxa_finalize
strcmp
__libc_start_main
[...]
.bss
.comment
No flag or password but a valuable information. The program is using string compare strcmp
. Most probably to compare user input with the password!
No choice. The CTF designer wants us to do some binary diving. Let's go for it. Challenge accepted!
We've found a strcmp
function and we know that strcmp
function works this way:
strcmp()
in C language:int strcmp(const char *str1, const char *str2)
Compares
str1
and str2
.Returns an integer; 0 if string are equals otherwise a non-zero value.
Assuming that the strcmp function is used for the password comparison, what I will attempt to do is:
- Run the program in debug mode
- Locate the
strcmp
function and set an execution breakpoint - Read the memory registry that contains the strings to compare
Looks like a pretty straight forward plan to me...
I like to use GDB as a debugger.
For those who are not familiar with GDB, here is a great cheat sheet.
Let's set it up to give us a nice view with following options:
set disassembly-flavor intel
layout asm
user@kali
:~/Documents/SANS CTF/BH02
$ gdb program
For help, type "help".
Type "apropos word" to search for commands related to "word".
(gdb) set disassembly-flavor intel
(gdb) layout asm
Now that we are setup.
We need to gather more information on the functions that are used in this binary.
We barely know nothing yet.
For this matter we will simply use info functions
.
(gdb) info functions
All defined functions:
Non-debugging symbols:
0x0000000000000630 _init
0x0000000000000660 puts@plt
0x0000000000000670 __stack_chk_fail@plt
0x0000000000000680 printf@plt
0x0000000000000690 fgets@plt
0x00000000000006a0 strcmp@plt
0x00000000000006b0 __cxa_finalize@plt
0x00000000000006c0 _start
0x00000000000006f0 deregister_tm_clones
0x0000000000000730 register_tm_clones
0x0000000000000780 __do_global_dtors_aux
0x00000000000007c0 frame_dummy
0x00000000000007ca main
0x0000000000000950 __libc_csu_init
0x00000000000009c0 __libc_csu_fini
0x00000000000009c4 _fini
Excellent news! The binary does not conains lot's of function. We can clearly identify strcmp
function.
It really looks like the CTF creator wants us to follow this direction.
We can set a breakpoint on the strcmp
function using command: b(reak) strcmp@plt
Then type r(un)
to launch the program.
(gdb) b strcmp@plt
Breakpoint 1 at 0x6a0
(gdb) r
Starting program: /home/user/Documents/SANS CTF/BH02/program
密码是什么?
> blah
Breakpoint 1, 0x00005555555546a0 in strcmp@plt ()
(gdb)
Perfect, our breakpoint is working. Now it should be piece of cake. We need to inspect the registry.
To do so, our best friend command is info registers
ds 0x0 0
es 0x0 strcmp@plt
rax 0x5555555549d8 93824992233944
rbx 0x0 0
rcx 0x5555557566b5 93824994338485
rdx 0x7fffffffdf50 140737488346960
rsi 0x7fffffffdf50 140737488346960
rdi 0x5555555549d8 93824992233944
rbp 0x7fffffffdfa0 0x7fffffffdfa0
rsp 0x7fffffffdf18 0x7fffffffdf18
r8 0x7fffffffdf50 140737488346960
r9 0x7ffff7fa9c00 140737353784320
r10 0x5d 93
r11 0x246 582
r12 0x5555555546c0 93824992233152
r13 0x0 0
r14 0x0 0
r15 0x0 0
From the assembly, we can see the registries involved in the strcmp
. You can identify rax, rcx, rdx, rsi, rdi, rbp, rsp
...
It means that the password we've entered and the password we are looking for are in these registries.
Let's check what's in each of them using e(x)amine command: x/s $rax
and x/s $rdx
.
(gdb) x/s $rax
0x5555555549d8: "龙123\n"
(gdb) x/s $rdx
0x7fffffffdf50: "blah\n"
Bingo!
We can find in the register rdx
the password we've entered and the rax
register contains the password we are looking for.
The password is: 龙123 (=Dragon123)
Run the program and provide this password to see what happens.
user@kali
:~/Documents/SANS CTF/BH02
$ ./program
密码是什么?
> 龙123
正确!
旗: gHn3*jXvs&H!@jGs
The password is correct! (正确!) The program returns us the flag (旗): gHn3*jXvs&H!@jGs
Lot's of fun!