ret2win
Locate a method that you want to call within the binary. Call it by overwriting a saved return address on the stack.
Enumeration
Checksec:
- No canary: Makes buffer overflow exploits and stack smashing possible.
- NX: The stack isn't executable. Injecting shellcode won't work.
- PIE*: No address space randomization. Symbol addresses won't change between executions.
When run, the program asks for user input:
The program crashes, but as mentioned in the guide, there is a ret2win
function in the binary that will call system()
to print the contents of the flag. This function isn't called from anywhere, but it can be reached by overwriting the return address with its address and calling ret
.
Attack
The program mentions that the input is stored in a 32 byte buffer. This can be confirmed by running the program with a pattern that's easy to search for, and calculating the distance in memory between the pattern and the return address:
There is 0x20 (32) bytes between the start of the input buffer and the return address of the function invoking read()
.
Important
The distance measured is up until the frame base pointer (RBP). To successfully redirect execution, the return address stored at RBP + 8 has to be overwritten with the address of the ret2win
function. This means that the total payload has to contain 40 bytes of padding, and not just 32.
Since the binary includes a function that carries out all the necessary steps for reading the flag, there isn't any need to build a long ROP chain to get to the flag. A sufficient payload is just a ret
instruction to return from the pwnme
function and then the address of ret2win
.
A ret
instruction is available at 0x40053e
(using ropper
). The full payload is: