๐–ˆ๐–ž๐–‡๐–Š๐–—๐–Œ๐–š๐–—๐–š๐Ÿ’€~$

Hamza's Blog

View on GitHub

GDB BASICS

This another challenge from crackme that tends to test your knowledge of GDB debugger,link to challenge.

A zip file was given in the challenge description, downloading it and unzipping we have:

we could see that itโ€™s a dynamically linked x86-64 executable file which is not stripped (^__^), when we run the file it prompts us for a password.

plugging the file in gdb we have:

setting the disassembly flavour to intel for easy readability of the assembly and getting info on the available functions we have:

from the previous photo we could see that the executable doesnโ€™t have much functions but theres a main

disassemblying the main function we have:

we could see that thereโ€™s some assembly callโ€™s here and there

explaning the assembly code

from our analysis above we could write a javascript code that proves our assertions from the assembly code

var prod = 2;

for(var i = 2; i < 14; i++){
    prod *= i;
}

console.log("Enter your password: ");
var user_input =  readline()
user_input = parseInt(user_input, 10)
if (user_input === prod){
    console.log("Correct, here's your FLAG");
}
else{
    console.log("WRONG, try again!!!");
}

but letโ€™s leave this aside for now since the challenge is base on gdb, and we should find a way to get the password using gdb, Now how do we go about that ???

WHAT DO WE KNOW TO GET THE PASSWORD ???

we know that the password is generated at runtime of the program and is stored somewhere in the program memeory which is then compared against our input, which the program then decide if it matches or not, with this idea in mind we could use the super power of GDB to debug the program and set breakpoints, but wait a minute, where is this important comparision against our password and the program password made โ€“ well going back to the previous picture were the assembly are marked, the fourth marked instruction shows us that important pointโ€ฆโ€ฆ.well good letโ€™s carry on

going back to gdb and executing the program for the first time and supplying a random password::

now letโ€™s set that breakpoint and examine the contents of [rbp-0x4] we have:

from the previous pic we could see that our breakpoint was hit and we saw the contents of [rbp-0x4] as 219283456 pheeeeeeโ€ฆโ€ฆ.. that was a easy one, now letโ€™s check the password in the program

and taraaaaaaaahโ€ฆโ€ฆ. we got our love message!!!!!!!