Simple Core Dump analyser

start

起因是XNUCA AI专题的一道题,题目要求编写程序,给出目标程序以及目标程序崩溃时产生的coredump文件,
分析出程序崩溃的原因(栈溢出或者堆溢出),以及漏洞地址
题目先前给出的条件中有一个运行时间的规定,规定时长2分钟,心想这时间是不是长了点,
是不是写个操纵gdb的程序然后用gdb来找溢出点呢?(笑

engage

既然是要分析coredump文件,就要了解coredump文件的具体结构
通过几天的学习,发现coredump文件和普通elf程序文件存在以下几个区别
1.没有导入表,虽然coredump完整的保留了源程序的plt和got,但无法直接得出程序调用了什么函数
2.多了一个NOTE段,保留了程序崩溃现场,对于我们来说最有用的就是保留下来的寄存器情况
3.保留了源程序崩溃时的栈以及堆的情况,这也是本程序的关键

接下来是具体分析过程了,现在可以从coredump中分析得出崩溃时的所有寄存器信息以及整个堆栈,问题就是如何从这些信息分析出程序崩溃的原因,
栈溢出崩溃是因为发生了栈上的越界读写,导致EIP被改写到了非法地址,或者EBP被改写,函数返回恢复栈时因为错误的EBP而导致栈被转移而发生错误
这两种情况的交际就是栈上的EBP肯定都被破坏,所以只要检测出程序崩溃时的EBP是否合法即可判定是否是栈溢出,(题目只给了两种情况,要么是栈溢出要么是堆溢出)

接下来就是分析溢出点了,溢出点利用栈上的返回地址回溯即可找到崩溃地址,结合源程序的.text段就可以分析出崩溃地址
对于堆溢出,采用栈的向后回溯方法,栈溢出则采用向前回溯的方法
原因在于栈溢出发生崩溃是在函数返回之后,而堆溢出则是发生在函数返回之前

code

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#define EI_NIDENT 16
#define ELF32_ST_BIND(i) ((i)>>4)
#define ELF32_ST_TYPE(i) ((i)&0xf)
#define ELF32_ST_INFO(b,t) (((b)<<4)+((t)&0xf))
typedef short int Elf32_Half;
typedef unsigned int Elf32_Word;
typedef unsigned int Elf32_Off;
typedef unsigned int Elf32_Addr;
typedef struct {
unsigned char e_ident[EI_NIDENT];
Elf32_Half e_type;
Elf32_Half e_machine;
Elf32_Word e_version;
Elf32_Addr e_entry;
Elf32_Off e_phoff;
Elf32_Off e_shoff;
Elf32_Word e_flags;
Elf32_Half e_ehsize;
Elf32_Half e_phentsize;
Elf32_Half e_phnum;
Elf32_Half e_shentsize;
Elf32_Half e_shnum;
Elf32_Half e_shstrndx;
} Elf32_Ehdr;
typedef struct {
Elf32_Word sh_name;
Elf32_Word sh_type;
Elf32_Word sh_flags;
Elf32_Addr sh_addr;
Elf32_Off sh_offset;
Elf32_Word sh_size;
Elf32_Word sh_link;
Elf32_Word sh_info;
Elf32_Word sh_addralign;
Elf32_Word sh_entsize;
} Elf32_Shdr;
typedef struct {
Elf32_Word p_type;
Elf32_Off p_offset;
Elf32_Addr p_vaddr;
Elf32_Addr p_paddr;
Elf32_Word p_filesz;
Elf32_Word p_memsz;
Elf32_Word p_flags;
Elf32_Word p_align;
} Elf32_Phdr;
unsigned int u32(char string[])
{
int i;
unsigned int result = 0;
strncpy((char *)&result, string, 4);
return result;
}
unsigned int ForwardTrace(FILE *fp, unsigned int TextStart, unsigned int TextRange, unsigned int StackBase, int EspOffset)
{
int offset = EspOffset;
unsigned int value;
char buf[5];
while ( offset > 0 )
{
memset(buf, 0, 5);
fseek(fp, StackBase + offset, SEEK_SET);
fread(buf, 4, 1, fp);
value = u32(buf);
if ( value > TextStart && value < (TextStart + TextRange) )
return ((value - 5) - TextStart);
//return value;
else
offset = offset - 4;
}
return 0;
}
unsigned int BackTrace(FILE *fp, unsigned int TextStart, unsigned int TextRange, unsigned int start, int range)
{
int offset = 0;
unsigned int value;
char buf[5];
while ( offset <= range )
{
memset(buf, 0, 5);
fseek(fp, start + offset, SEEK_SET);
fread(buf, 4, 1, fp);
value = u32(buf);
if ( value > TextStart && value < (TextStart + TextRange) )
return ((value - 5) - TextStart);
//return value;
else
offset = offset + 4;
}
return 0;
}
void ReadElfHeader(FILE *fp, Elf32_Ehdr *elfhdr, void *fphdr)
{
fphdr = malloc(sizeof(Elf32_Ehdr));
fread(fphdr, sizeof(Elf32_Ehdr),1, fp);
int i;
for ( i = 0; i < 16; i ++ )
elfhdr->e_ident[i] = ((Elf32_Ehdr*)fphdr)->e_ident[i];
elfhdr->e_ident[6] = ((Elf32_Ehdr*)fphdr)->e_ident[6];
elfhdr->e_type = ((Elf32_Ehdr*)fphdr)->e_type;
elfhdr->e_machine = ((Elf32_Ehdr*)fphdr)->e_machine;
elfhdr->e_entry = ((Elf32_Ehdr*)fphdr)->e_entry;
elfhdr->e_phoff = ((Elf32_Ehdr*)fphdr)->e_phoff;
elfhdr->e_shoff = ((Elf32_Ehdr*)fphdr)->e_shoff;
elfhdr->e_phentsize = ((Elf32_Ehdr*)fphdr)->e_phentsize;
elfhdr->e_phnum = ((Elf32_Ehdr*)fphdr)->e_phnum;
elfhdr->e_shentsize = ((Elf32_Ehdr*)fphdr)->e_shentsize;
elfhdr->e_shnum = ((Elf32_Ehdr*)fphdr)->e_shnum;
elfhdr->e_shstrndx = ((Elf32_Ehdr*)fphdr)->e_shstrndx;
}
int main(int argc, char* argv[])
{
int i, j;
FILE *fp;
void *fphdr;
void *shdr;
void *phdr;
ssize_t size;
Elf32_Ehdr elfhdr;
fp = fopen(argv[2], "r");
ReadElfHeader(fp, &elfhdr, fphdr);
fseek(fp, elfhdr.e_shoff, SEEK_SET);
shdr = malloc(sizeof(Elf32_Shdr)*elfhdr.e_shnum);
size = fread(shdr, sizeof(Elf32_Shdr),elfhdr.e_shnum, fp);
char SectionName[128];
//printf("%d\n", elfhdr.e_shnum);
for ( i = 0; i < elfhdr.e_shnum; i ++ )
{
j = 0;
//printf("%d\n", i);
//printf("* [%2d]",i);
//memset(SectionName, 0, 128);
fseek(fp, ((((Elf32_Shdr*)shdr)[elfhdr.e_shstrndx]).sh_offset + (((Elf32_Shdr*)shdr)[i]).sh_name), SEEK_SET);
do
{
SectionName[j] = getc(fp);
}while('\0' != SectionName[j++]);
//printf("%s\n", SectionName);
if ( !strcmp(SectionName, ".text") )
break;
}
int TextRange, TextStart, TextOffset;
TextOffset = (((Elf32_Shdr*)shdr)[i]).sh_offset;
TextStart = (((Elf32_Shdr*)shdr)[i]).sh_addr;
TextRange = (((Elf32_Shdr*)shdr)[i]).sh_size;
close(fp);
fp = fopen(argv[1], "r");
ReadElfHeader(fp, &elfhdr, fphdr);
fseek(fp, elfhdr.e_shoff, SEEK_SET);
shdr = malloc(sizeof(Elf32_Shdr)*elfhdr.e_shnum);
size = fread(shdr, sizeof(Elf32_Shdr),elfhdr.e_shnum, fp);
fseek(fp, elfhdr.e_phoff, SEEK_SET);
phdr = malloc(sizeof(Elf32_Phdr)*elfhdr.e_phnum);
size = fread(phdr, sizeof(Elf32_Phdr), elfhdr.e_phnum, fp);
int NoteBase, StackBase, VirtStackBase;
int StackSize;
int OffsetToNote_ebp = 0x70, OffsetToNote_esp = 0x98;
char buf[5];
NoteBase = (((Elf32_Phdr*)phdr)[0]).p_offset;
StackBase = (((Elf32_Phdr*)phdr)[elfhdr.e_phnum - 1]).p_offset;
VirtStackBase = (((Elf32_Phdr*)phdr)[elfhdr.e_phnum - 1]).p_vaddr;
StackSize = (((Elf32_Phdr*)phdr)[elfhdr.e_phnum - 1]).p_memsz;
printf("Note base: 0x%08x\n", NoteBase);
printf("Stack base: 0x%08x\n", StackBase);
printf("Stack VirAddr: 0x%08x\n", VirtStackBase);
printf("Stack size: 0x%08x\n", StackSize);
printf("Text start: 0x%08x\n", TextStart);
printf("Text range: 0x%08x\n", TextRange);
fseek(fp, NoteBase + OffsetToNote_ebp, SEEK_SET);
memset(buf, 0, 5);
fread(buf, 4, 1, fp);
int EbpPtr = u32(buf);
printf("ebp ptr: 0x%08x\n", EbpPtr);
fseek(fp, NoteBase + OffsetToNote_esp, SEEK_SET);
memset(buf, 0, 5);
fread(buf, 4, 1, fp);
int EspPtr = u32(buf);
printf("esp ptr: 0x%08x\n", EspPtr);
int OffsetToStack_ebp = EbpPtr - VirtStackBase;
int OffsetToStack_esp = EspPtr - VirtStackBase;
printf("ebp ptr offset: 0x%08x\n", OffsetToStack_ebp);
printf("esp ptr offset: 0x%08x\n", OffsetToStack_esp);
if ( OffsetToStack_ebp < 0 || OffsetToStack_ebp > StackSize )
{
unsigned int VulAddr = ForwardTrace(fp, TextStart, TextRange, StackBase, OffsetToStack_esp);
printf("Stack Overflow Detected\n");
printf("Vul Offset To Binary: 0x%08x\n", VulAddr + TextOffset);
printf("Vul Address: 0x%08x\n", VulAddr + TextStart);
close(fp);
return 0;
}
unsigned int VulAddr = BackTrace(fp, TextStart, TextRange, OffsetToStack_ebp + StackBase, StackSize - OffsetToStack_ebp);
printf("Vul Offset To Binary: 0x%08x\n", VulAddr + TextOffset);
printf("Vul Address: 0x%08x\n", VulAddr + TextStart);
close(fp);
return 0;
}
文章目录
  1. 1. start
  2. 2. engage
  3. 3. code
|