InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

Member-only story

[ExpDev] Exploit Exercise | Protostar | Format 3

bigb0ss
InfoSec Write-ups
Published in
7 min readMay 30, 2020

Format 3 (Format String Basic 3)

The goal of this challenge is to leverage a Format String vulnerability to write arbitrary bytes to the process memory and to print out the winning statement.

Things to note

  • char buffer[512]: Setting the buffer size to 512.
  • fgets(buffer, sizeof(buffer), stdin): This func gets a user supplied-input. And it limits the buffer size to 512. We can max-input 511 bytes because C always add 0x00 at the end as a string terminator.
  • printf(string);: This is the vulnerable function in this code. The printf() will not check whether the supplied inputs are expected format strings or not. This is because it’s coded to accept any input values at the location where the format parameter is supposed to be. So what we can do is simply to verify if we can leak the memory addresses and also write arbitrary values onto the stack ([READ] %p or %x[WRITE] %n).
  • if(target == 0x01025544) {: The target variable is what we need to find on the stack. Then, leveraging a Format String vulnerability, we will overwrite the 4 bytes to the target to match with the 0x01025544 to print out the winning statement.

Disassemble (GDB)

Let’s disassemble the binary to see what is doing at the ASM-level. This is very similar to the Format2. Only difference is the cmp value:

$ gdb -q format3
Reading symbols from /opt/protostar/bin/format3...done.
(gdb) set disassembly-flavor intel
(gdb) disassemble vuln

Exploit

Initial Recon

Let’s supply some random strings to watch how the program behaves:

$ python -c 'print "AAAA"' | /opt/protostar/bin/format3 
AAAA
target is 00000000 :(

Create an account to read the full story.

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web

Already have an account? Sign in

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by bigb0ss

OSWE | OSCE | OSCP | CREST | Principal Offensive Security Engineer — All about Penetration Test, Red Team, Cloud Security, Web Application Security

Responses (1)

Write a response