UMDCTF 2020: Evil Santa's Mysterious Box of Treats
Patching and Instruction counting towards first blood.
Here we are given a 64bit ELF executable and we're tasked with finding the flag.
Running the binary:
Running the binary reveals that it is looking for input on STDIN. When you pass in an invalid flag it responds with "You are getting coal for the next five years!"
Running strings
on the binary reveals the first clue: with this much symbol data available it's possible that the binary is statically linked and will make debugging and static analysis difficult.
We can confirm this suspicion by parsing the binary and reading symbols through running readelf -s EvilSantasBox.back
. Without symbols this makes instrumenting this binary through and LD_PRELOAD tricks impossible. So our next step is opening it up in ghidra.
Ghidra reveals a massive listing of functions in the it's function table further confirming static compilation.
Following the entry function I discovered that main
was the function defined at 0x004005c0
. Scrolling down through the decompilation reveals a couple additional pieces:
* Function at 0x411360 prints to screen * Function at 0x410680 collects user input * The user input is likely 0x28 (40) characters long * The success string of the binary is printing "You received a present from santa this year!"
The next step is setting up a debugger and then stepping through the binary after collecting some random input, however the challenge posses some anti-debugging logic as seen below:
To investigate why the program exited I used strace
to try and identify what syscalls the program used up to the point of failure. strace
revealed that the program makes a ptrace
syscall with the PTRACE_TRACEME
argument. This is a Classic anti-debuging technique that is easily solved through patching.
To identify where the syscall is made I used some QEMU usermode emulation through qemu-x86_64
to provide tracing information on the syscall. Using the command qemu-x86_64 -d in_asm ./EvilSantasBox.back 2>&1 | grep syscall
Qemu will output all the instructions it executes with the addresses associated with those instructions as seen below.
Qemu provided a little hint for us since 101
is the syscall number for ptrace. So we know that the binary calls ptrace at address 0x44b30d
and we can track this back down in ghidra and patch it out with nulls. The function containing that address is shown below.
The function above will return the status code of the ptrace call, so looking at the function xrefs we can identify where this call is being made. The function at 0x4012a0
will call this function and return either a 0 or a 1 and print out the previous error message we saw before. By patching out the check and always returning a 0 we can avoid being detected!
Removing this check allows gdb
and strace
to work again! Being the lazy reverse engineer that I am, I wanted to see if this binary is vulnerable to side channel analysis. If CTF problems verify solutions incrementally, then instruction counting is a super easy way to recover a flag *FAST*! Scrolling back down the to success string reveals the the input received from the function at 0x410680
is then subjected to a number of individual byte comparisons. If anyone one of these checks fail, then the program exits before checking the rest. (SCORE!) CTF problems that do this or use memcmp or strcmp tend to fall into this category too.
So I broke out Instruction Stomp and fired it up with the two below commands.
Instruction stomp starting creating some weird looking input, so I immediately thought that there might be some non-deterministic instructions being executed. Looking back through the strace
reveals that there is a syscall made to get the current time. Using the same qemu-x86_64 -d in_asm
trick from earlier I was able to find where this syscall was made and patch it out.
Firing Instruction Stomp off again reveals the flag after a minute or two. The flag appears to be base64 encoded, so base64 decoding reveals the final flag. By using instruction counting instead of dumping each value out of a debugger I was able to quickly snatch a first blood with this problem.
Last updated