[PWNABLE.TW] - Start
Challenge Information
Description: Just a start.
Tags:
- Buffer Overflow
- Shellcode
Analysis
1 | [*] '/home/alter/pwn/pwnable.tw/start/start' |
We begin by analyzing the binary, which lacks any protection mechanisms. The NX
bit is disabled, meaning that we can consider a shellcode injection approach. To better understand how the binary operates, let’s examine it in GDB.
1 | pwndbg> info fun |
From this output, we can see that the binary is quite minimal, and notably, it does not contain a main function. This suggests that the binary was likely handcrafted specifically for this challenge. Because of its small size and simplicity, reverse engineering it should be straightforward. Since _start
is the entry point of the binary, so let’s disassemble it to see what it does:
1 | pwndbg> disass _start |
Let’s break it out to have more information about it:
- First it clear the registers for doing syscall purpose:
1 | 0x08048066 <+6>: xor eax,eax |
- Then push the value to the stack:
1 | 00:0000│ esp 0xffffce74 ◂— 0x2774654c ("Let'") |
- Next is using
write
syscall to write out 0x14 bytes data point byesp
:
1 | 0x08048087 <+39>: mov ecx,esp |
- And finally read our input using
read
syscall:
1 | 0x08048091 <+49>: xor ebx,ebx |
And seem like there’s Buffer Overflow
here so I tried with a very large padding for test:
1 | pwndbg> cyclic 0x3c |
And yes! We got the offset!
Exploit Development
The problem here is that we know we can inject the shellcode, but how can we get it to execute? My idea is to find a way to leak an address from somewhere and then calculate the starting address of our shellcode. So let’s see what gadgets we have:
1 | $ ropper -f start |
Hmmm, interesting. It seems there aren’t many useful gadgets, as I had guessed. It took me a lot of time to figure out how to use these gadgets effectively. Finally, I found one that found:
1 | 0x08048086: daa; mov ecx, esp; mov dl, 0x14; mov bl, 1; mov al, 4; int 0x80; |
This gadget has a useful property—it can print out the value at the top of the stack. If we look back at our analysis, we can see that this is part of the write
syscall we examined earlier. And once we have the leak address just calculate back to our input buf
and put the shellcode there and let the program return back to our shellcode (The program lets us input data a second time because we use gadgets in the _start
function and it will perform all its instructions until it encounters ret
)
1 | #!/usr/bin/env python3 |
P/S: My first shellcode didn’t look like this, but for some reason, it was still able to execute execve
. So, I changed my approach to injecting /bin/sh
.
Get flag
1 | alter ^ Sol in ~/lab/pwnable.tw/start |
- Title: [PWNABLE.TW] - Start
- Author: *ptr
- Created at : 2025-02-01 06:55:00
- Updated at : 2025-04-04 01:21:55
- Link: https://5o1z.github.io/2025/01/31/pwnable.tw/Start/writeup/
- License: This work is licensed under CC BY-NC-SA 4.0.