2022祥云杯CTF babyparser
本文为看雪论坛优秀文章
看雪论坛作者ID:1mmortal
一
比赛时的逆向
二
赛后复盘
去混淆
#coding=utf-8import collectionsimport angrimport am_graphfrom util import *# from keystone import *from unicorn import *from unicorn.x86_const import *from capstone import *from capstone.x86 import *obfus = [0x405DA0, 0x417610, 0x4149D0]def reg_ctou(regname:str):# This function covert capstone reg name to unicorn reg const.# https://github.com/unicorn-engine/unicorn/blob/master/bindings/python/unicorn/x86_const.pymp = { 'INVALID' : 0, 'AH' : 1, 'AL' : 2, 'AX' : 3, 'BH' : 4, 'BL' : 5, 'BP' : 6, 'BPL' : 7, 'BX' : 8, 'CH' : 9, 'CL' : 10, 'CS' : 11, 'CX' : 12, 'DH' : 13, 'DI' : 14, 'DIL' : 15, 'DL' : 16, 'DS' : 17, 'DX' : 18, 'EAX' : 19, 'EBP' : 20, 'EBX' : 21, 'ECX' : 22, 'EDI' : 23, 'EDX' : 24, 'EFLAGS' : 25, 'EIP' : 26, 'ES' : 28, 'ESI' : 29, 'ESP' : 30, 'FPSW' : 31, 'FS' : 32, 'GS' : 33, 'IP' : 34, 'RAX' : 35, 'RBP' : 36, 'RBX' : 37, 'RCX' : 38, 'RDI' : 39, 'RDX' : 40, 'RIP' : 41, 'RSI' : 43, 'RSP' : 44, 'SI' : 45, 'SIL' : 46, 'SP' : 47, 'SPL' : 48, 'SS' : 49, 'CR0' : 50, 'CR1' : 51, 'CR2' : 52, 'CR3' : 53, 'CR4' : 54, 'CR8' : 58, 'DR0' : 66, 'DR1' : 67, 'DR2' : 68, 'DR3' : 69, 'DR4' : 70, 'DR5' : 71, 'DR6' : 72, 'DR7' : 73, 'FP0' : 82, 'FP1' : 83, 'FP2' : 84, 'FP3' : 85, 'FP4' : 86, 'FP5' : 87, 'FP6' : 88, 'FP7' : 89, 'K0' : 90, 'K1' : 91, 'K2' : 92, 'K3' : 93, 'K4' : 94, 'K5' : 95, 'K6' : 96, 'K7' : 97, 'MM0' : 98, 'MM1' : 99, 'MM2' : 100, 'MM3' : 101, 'MM4' : 102, 'MM5' : 103, 'MM6' : 104, 'MM7' : 105, 'R8' : 106, 'R9' : 107, 'R10' : 108, 'R11' : 109, 'R12' : 110, 'R13' : 111, 'R14' : 112, 'R15' : 113, 'ST0' : 114, 'ST1' : 115, 'ST2' : 116, 'ST3' : 117, 'ST4' : 118, 'ST5' : 119, 'ST6' : 120, 'ST7' : 121, 'XMM0' : 122, 'XMM1' : 123, 'XMM2' : 124, 'XMM3' : 125, 'XMM4' : 126, 'XMM5' : 127, 'XMM6' : 128, 'XMM7' : 129, 'XMM8' : 130, 'XMM9' : 131, 'XMM10' : 132, 'XMM11' : 133, 'XMM12' : 134, 'XMM13' : 135, 'XMM14' : 136, 'XMM15' : 137, 'XMM16' : 138, 'XMM17' : 139, 'XMM18' : 140, 'XMM19' : 141, 'XMM20' : 142, 'XMM21' : 143, 'XMM22' : 144, 'XMM23' : 145, 'XMM24' : 146, 'XMM25' : 147, 'XMM26' : 148, 'XMM27' : 149, 'XMM28' : 150, 'XMM29' : 151, 'XMM30' : 152, 'XMM31' : 153, 'YMM0' : 154, 'YMM1' : 155, 'YMM2' : 156, 'YMM3' : 157, 'YMM4' : 158, 'YMM5' : 159, 'YMM6' : 160, 'YMM7' : 161, 'YMM8' : 162, 'YMM9' : 163, 'YMM10' : 164, 'YMM11' : 165, 'YMM12' : 166, 'YMM13' : 167, 'YMM14' : 168, 'YMM15' : 169, 'YMM16' : 170, 'YMM17' : 171, 'YMM18' : 172, 'YMM19' : 173, 'YMM20' : 174, 'YMM21' : 175, 'YMM22' : 176, 'YMM23' : 177, 'YMM24' : 178, 'YMM25' : 179, 'YMM26' : 180, 'YMM27' : 181, 'YMM28' : 182, 'YMM29' : 183, 'YMM30' : 184, 'YMM31' : 185, 'ZMM0' : 186, 'ZMM1' : 187, 'ZMM2' : 188, 'ZMM3' : 189, 'ZMM4' : 190, 'ZMM5' : 191, 'ZMM6' : 192, 'ZMM7' : 193, 'ZMM8' : 194, 'ZMM9' : 195, 'ZMM10' : 196, 'ZMM11' : 197, 'ZMM12' : 198, 'ZMM13' : 199, 'ZMM14' : 200, 'ZMM15' : 201, 'ZMM16' : 202, 'ZMM17' : 203, 'ZMM18' : 204, 'ZMM19' : 205, 'ZMM20' : 206, 'ZMM21' : 207, 'ZMM22' : 208, 'ZMM23' : 209, 'ZMM24' : 210, 'ZMM25' : 211, 'ZMM26' : 212, 'ZMM27' : 213, 'ZMM28' : 214, 'ZMM29' : 215, 'ZMM30' : 216, 'ZMM31' : 217, 'R8B' : 218, 'R9B' : 219, 'R10B' : 220, 'R11B' : 221, 'R12B' : 222, 'R13B' : 223, 'R14B' : 224, 'R15B' : 225, 'R8D' : 226, 'R9D' : 227, 'R10D' : 228, 'R11D' : 229, 'R12D' : 230, 'R13D' : 231, 'R14D' : 232, 'R15D' : 233, 'R8W' : 234, 'R9W' : 235, 'R10W' : 236, 'R11W' : 237, 'R12W' : 238, 'R13W' : 239, 'R14W' : 240, 'R15W' : 241, 'IDTR' : 242, 'GDTR' : 243, 'LDTR' : 244, 'TR' : 245, 'FPCW' : 246, 'FPTAG' : 247, 'MSR' : 248, 'MXCSR' : 249, 'FS_BASE' : 250, 'GS_BASE' : 251, 'FLAGS' : 252, 'RFLAGS' : 253, 'FIP' : 254, 'FCS' : 255, 'FDP' : 256, 'FDS' : 257, 'FOP' : 258, 'ENDING' : 259, }regname = regname.upper()return mp[regname]def get_context(): # record all X86/64 regsglobal mureturn mu.context_save()def set_context(context:bytes):global muif context == None :returnelse:mu.context_restore(context)return# callback for memory exceptiondef hook_mem_access(uc,type,address,size,value,userdata):pc = uc.reg_read(UC_X86_REG_RIP)print ('pc:%x type:%d addr:%x size:%x' % (pc,type,address,size))def hook_code(uc, address, size, user_data):global baseglobal is_successglobal list_traceglobal relevantsglobal next_real_block_addrglobal block_start_addrglobal branch_controlglobal instrs_sizeglobal memset_countglobal nop_instrucinstrs_size = sizeif is_success:uc.emu_stop()return# if address > end:# uc.emu_stop()# returnfor ins in md.disasm(bin[address-base:address -base + size], address-base):#print(">>> Tracing instruction at 0x%x, instruction size = 0x%x" % (address, size))#print(">>> 0x%x:\t%s\t%s" % (ins.address, ins.mnemonic, ins.op_str))# bfs 的visit array 防止陷入循环if address in relevants:if address in list_trace:print("sssssss")uc.emu_stop()else:list_trace[address] = 1# 找到了下一个块if address in relevants and address != block_start_addr:is_success = Truenext_real_block_addr = address#print 'find:%x' % addressuc.emu_stop()return#是否跳过指令flag_pass = Falseif ins.mnemonic.startswith("call") :if(ins.op_str == '0x2090' and memset_count < 2): # hook memset twicememset_count += 1ptr = uc.reg_read(UC_X86_REG_RDI)val = uc.reg_read(UC_X86_REG_ESI).to_bytes(1,'little')siz = uc.reg_read(UC_X86_REG_EDX)uc.mem_write(ptr,val*siz)flag_pass = Trueelif(ins.op_str not in ('rax','rbx','rcx','rdx','rsi','rdi','r8','r9','r10','r11','r12','r13','r14','r15') ):flag_pass = Trueelif(ins.op_str in ('rax','rbx','rcx','rdx','rsi','rdi','r8','r9','r10','r11','r12','r13','r14','r15')):func = uc.reg_read(reg_ctou(ins.op_str))if func in obfus:nop_instruc.add((address,size))else:flag_pass = True# 用于跳过指令if flag_pass:uc.reg_write(UC_X86_REG_RIP, address + size)return# 结束块单独处理if ins.id == X86_INS_RET :if relevants[block_start_addr] in retn_nodes:# uc.reg_write(UC_X86_REG_RIP, 0) # 必须注释掉 https://github.com/unicorn-engine/unicorn/issues/1133is_success = Falseprint ("ret ins in {}".format(hex(address)))uc.emu_stop()returnelse: # in obfus functionpass#ollvm branchif ins.mnemonic.startswith('cmov'):#print("csel 0x%x:\t%s\t%s" %(ins.address, ins.mnemonic, ins.op_str))regs = [reg_ctou(x) for x in ins.op_str.split(', ')]assert len(regs) == 2v1 = uc.reg_read(regs[0])v2 = uc.reg_read(regs[1])if branch_control == 1:uc.reg_write(regs[0], v1)else:uc.reg_write(regs[0], v2)uc.reg_write(UC_X86_REG_RIP, address + size)def find_path(start_addr,branch = None, from_error = False):global binglobal baseglobal muglobal list_traceglobal block_start_addrglobal next_real_block_addrglobal is_successglobal branch_controltry:list_trace = {}if from_error == False:block_start_addr = start_addris_success = Falsenext_real_block_addr = 0branch_control = branchmu.emu_start(start_addr, start_addr+0x10000) # unitl 参数不重要 因为hookcode会断住except UcError as e:pc = mu.reg_read(UC_X86_REG_RIP)if pc != 0:# 模拟执行碰到和恢复控制流无关的问题,就略过该指令继续运行# 是一个递归,block不大的情况下应该不会递归爆炸print(" pc:%x block_start_addr:%x" % (pc,block_start_addr))return find_path(pc + instrs_size, branch, from_error=True)else:print("ERROR: %s pc:%x block_start_addr:%x" % (e,pc,block_start_addr))if is_success:return next_real_block_addrreturn Nonedef fix(bin:bytearray,flow:dict,nop_nodes:list, patch_instrs :dict):ori_len = len(bin)# patch irrelevant blocksfor nop_node in nop_nodes:fill_nop(bin, nop_node.addr-base,nop_node.size, project.arch)for a in nop_instruc:fill_nop(bin, a[0]-base, a[1], project.arch)# remove unnecessary control flowsfor parent, childs in flow.items():parent = relevants[parent]if len(childs) == 1:parent_block = project.factory.block(parent.addr, size=parent.size)last_instr = parent_block.capstone.insns[-1]file_offset = last_instr.address - base# patch the last instruction to jmpif(parent.addr + parent.size == childs[0] and last_instr.op_str != hex(the_last_jmp_block)): # 下一个块就是要去的块就不用patchcontinueif project.arch.name in ARCH_X86:fill_nop(bin, file_offset, last_instr.size, project.arch)patch_value = ins_j_jmp_hex_x86(last_instr.address, childs[0], 'jmp')patch_instruction(bin, file_offset, patch_value)else:instr = patch_instrs[parent]file_offset = instr.address - base# patch instructions starting from `cmovx` to the end of blockfill_nop(bin, file_offset, parent.addr +parent.size - base - file_offset, project.arch)if project.arch.name in ARCH_X86:# patch the cmovx instruction to jx instructionpatch_value = ins_j_jmp_hex_x86(instr.address, childs[0], instr.mnemonic[len('cmov'):])patch_instruction(bin, file_offset, patch_value)file_offset += 6# patch the next instruction to jmp instrcutionpatch_value = ins_j_jmp_hex_x86(instr.address+6, childs[1], 'jmp')patch_instruction(bin, file_offset, patch_value)assert(ori_len == len(bin))return binif __name__ == "__main__":md = Cs(CS_ARCH_X86,CS_MODE_64)md.detail = Truefilename = "babyparser_recover_main"new_filename = filenamewith open(filename, 'rb') as fp:bin = fp.read()project = angr.Project(filename, load_options={'auto_load_libs': False})base = project.loader.main_object.mapped_base >> 12 << 12start = 0x40fe20the_last_jmp_block = 0x411448#cfg = project.analyses.CFGFast(normalize=True)cfg = project.analyses.CFGFast(normalize=True,force_complete_scan=False)target_function = cfg.functions.get(start)assert target_function != None# end = start + target_function.sizesupergraph = am_graph.to_supergraph(target_function.transition_graph)# *******************GET BLOCK***************************# get prologue_node(开始结点) and retn_nodeprologue_nodes = []retn_nodes = []relevant_nodes = []nop_nodes = []patch_instrs = {}for node in supergraph.nodes():if supergraph.in_degree(node) == 0:prologue_nodes.append(node)elif supergraph.out_degree(node) == 0 :retn_nodes.append(node)elif supergraph.out_degree(node) == 1 and node.addr != the_last_jmp_block:relevant_nodes.append(node)elif supergraph.out_degree(node) == 2 :nop_nodes.append(node)print(prologue_nodes)print(retn_nodes)if len(prologue_nodes) != 1 or prologue_nodes[0].addr != start:print("Something must be wrong...")exit(0)main_dispatcher_node = list(supergraph.successors(prologue_nodes[0]))[0]relevant_block_addrs = [(node.addr) for node in relevant_nodes]relevants = {}for node in relevant_nodes+prologue_nodes+retn_nodes:relevants[node.addr] = nodeprint('*******************relevant blocks************************')print('prologue: %#x' % start)print('main_dispatcher: %#x' % main_dispatcher_node.addr)print('retn: ' , [hex(node.addr) for node in retn_nodes])print('relevant_blocks:', [hex(addr) for addr in relevant_block_addrs])print('*******************simulated execution*********************')flow = collections.defaultdict(list)instrs_size = 0memset_count = 0nop_instruc = set()mu = Uc(UC_ARCH_X86, UC_MODE_64)#init stackmu.mem_map(0x80000000,0x10000 * 8)# map 4MB memory for this emulationmu.mem_map(base, 16 * 1024 * 1024)# write machine code to be emulated to memorymu.mem_write(0x401000, bin[0x2000:0x2000+0x19559]) # code segmentmu.mem_write(0x420dd0,bin[0x20dd0:0x20dd0+0x6270]) # data segmentmu.reg_write(UC_X86_REG_RSP, 0x80000000 + 0x10000 * 6)mu.hook_add(UC_HOOK_CODE, hook_code) # 对每条指令hookmu.hook_add(UC_HOOK_MEM_UNMAPPED, hook_mem_access)#set function argvmu.reg_write(UC_X86_REG_RDI, 1) # set argclist_trace = {}is_debug = Falsequeue = [(start, None)]while len(queue) != 0:env = queue.pop()address = env[0]context = env[1]if address in flow:continueset_context(context)node = relevants[address]block = project.factory.block(address, size=node.size) # 当前处理的块has_branches = Falsehook_addr = []#检测代码块中是否有ollvm生成的分支for ins in block.capstone.insns:if ins.insn.mnemonic.startswith('cmov'):has_branches = Trueif node not in patch_instrs:patch_instrs[node] = insbreak#代码块中有ollvm生成的分支if has_branches:ctx = get_context()p1 = find_path(address, 0)if p1 != None:queue.append((p1, get_context()))flow[address].append(p1)set_context(ctx)p2 = find_path(address, 1)if p1 == p2:p2 = Noneif p2 != None:queue.append((p2, get_context()))flow[address].append(p2)else:p = find_path(address)if p != None:queue.append((p, get_context()))flow[address].append(p)# print(flow)print('************************flow******************************')for k, v in flow.items():print('%#x: ' % k, [hex(child) for child in v])print('************************fix******************************')new_bin = fix(bytearray(bin), flow, nop_nodes, patch_instrs)with open(new_filename,"wb") as fp:fp.write(new_bin)
cpp stl 逆向
struct deque_iter{obj* cur;obj* begin;obj* end;obj* cur_node;};struct deque{ptr M_map;size_t M_map_size;deque_iter start;deque_iter finish;};struct vector{obj begin[vector.size];obj* obj_end;obj* capacity_end;};
加密部分的处理
from unicorn import *from unicorn.x86_const import *from capstone import *from capstone.x86 import *from itertools import productfrom tqdm import tqdmbase = 0x3ff000def trans(a)->bytes:ret = [0]*(len(a)*4)for i in range(len(a)):ret[i*4] = ord(a[i])return bytes(ret)candi = []for c in product('abcdef',repeat=2):candi.append(trans(c))a = list(0xB997FEA9D35F1491.to_bytes(8,'little') + 0xF199D36FCF4A12C7.to_bytes(8,'little'))# --------------------bruteforce enc--------------------# with open("./babyparser", 'rb') as fp:# bin = fp.read()# def hook_code(uc, address, size, user_data):# for ins in md.disasm(bin[address-base:address -base + size], address-base):# # print(">>> Tracing instruction at 0x%x, instruction size = 0x%x" % (address, size))# # print(">>> 0x%x:\t%s\t%s" % (ins.address, ins.mnemonic, ins.op_str))# if ins.mnemonic.startswith("call") :# if(ins.op_str == '0x2090'): # hook memset twice# ptr = uc.reg_read(UC_X86_REG_RDI)# val = uc.reg_read(UC_X86_REG_ESI).to_bytes(1,'little')# siz = uc.reg_read(UC_X86_REG_EDX)# uc.mem_write(ptr,val*siz)# uc.reg_write(UC_X86_REG_RIP, address + size)# md = Cs(CS_ARCH_X86,CS_MODE_64)# md.detail = True# mu = Uc(UC_ARCH_X86, UC_MODE_64)# #init stack# mu.mem_map(0x80000000,0x10000 * 8)# # map 4MB memory for this emulation# mu.mem_map(base, 16 * 1024 * 1024)# # write machine code to be emulated to memory# mu.mem_write(0x401000, bin[0x2000:0x2000+0x19559]) # code segment# mu.mem_write(0x420dd0,bin[0x20dd0:0x20dd0+0x6270]) # data segment# mu.reg_write(UC_X86_REG_RSP, 0x80000000 + 0x10000 * 6)# mu.hook_add(UC_HOOK_CODE, hook_code) # 对每条指令hook# initial = mu.context_save()# for key in [b"hello123",b"hello456"]: # b"hello123"# f = open(key.decode(), 'wb')# for can in tqdm(candi):# mu.context_restore(initial)# mu.mem_write(0x80000010,key)# mu.reg_write(UC_X86_REG_RDI,0x80000010)# mu.mem_write(0x80000020,can)# mu.reg_write(UC_X86_REG_RSI,0x80000020)# mu.reg_write(UC_X86_REG_RDX,0x80000030)# mu.reg_write(UC_X86_REG_ECX,8)# mu.emu_start(0x40F5B0, 0x40F5F1)# enced = mu.mem_read(0x80000030,8)# f.write(can+enced)# f.close()b = list(0x26F04376032014A3.to_bytes(8,'little') + 0x4744333708D0E9AC.to_bytes(8,'little'))with open("hello123",'rb') as f:con = f.read()h123 = {}for i in range(0,len(con),0x20):h123[con[i+0x10:i+0x20]] = con[i:i+0x10]h456 = {}with open("hello456",'rb') as f:con = f.read()for i in range(0,len(con),0x10):h456[con[i+0x8:i+0x10]] = con[i:i+0x8]def brute(cmp:list):for n123 in tqdm(h123):for n456_1 in h456:for n456_2 in h456:n456 = n456_1+n456_2tmp = [n123[i]^n456[i] for i in range(16)]if(tmp == list(cmp)):print(h123[n123],h456[n456[0:8]],h456[n456[8:16]]) #babe cafereturn# ?0xdead|0xbeef!^?0xcafe|0xbabe!import sm4k1 = sm4.SM4Key(b'smithsmith666666')tmp = k1.encrypt(bytes(a))print(tmp)cmp2 = [tmp[i]^b[i] for i in range(16)]k2 = sm4.SM4Key(b'smithsmith777777')cmp2 = k2.decrypt(bytes(cmp2))brute(cmp2) # beef dead
看雪ID:1mmortal
https://bbs.pediy.com/user-home-954035.htm
看雪2022KCTF秋季赛官网:https://ctf.pediy.com/game-team_list-18-29.htm
# 往期推荐
球分享
球点赞
球在看
点击“阅读原文”,了解更多!