This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ strace -o 1 setarch x86_64 -R ls | |
1 2 a.out aslr.c | |
$ strace -o 2 setarch x86_64 ls | |
1 2 a.out aslr.c | |
$ diff 1 2 | |
... | |
a lot of differences | |
... |
There are a lot of differences, because of the ASLR: In the log there are a lot memory addresses and they will be different. Now lets disable it for all processes and then do above steps again to filter out memory differences.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ echo 0 | sudo tee /proc/sys/kernel/randomize_va_space | |
$ strace -o 1 setarch x86_64 -R ls | |
1 2 a.out aslr.c | |
$ strace -o 2 setarch x86_64 ls | |
1 2 a.out aslr.c | |
$ diff 1 2 | |
1c1 | |
< execve("/usr/bin/setarch", ["setarch", "x86_64", "-R", "ls"], [/* 38 vars */]) = 0 | |
--- | |
> execve("/usr/bin/setarch", ["setarch", "x86_64", "ls"], [/* 38 vars */]) = 0 | |
33c33 | |
< personality(0x40000 /* PER_??? */) = 0 | |
--- | |
> personality(PER_LINUX) = 0 | |
123c123 | |
< set_tid_address(0x7ffff7fdaa70) = 4718 | |
--- | |
> set_tid_address(0x7ffff7fdaa70) = 4720 | |
$ |
There is enum ADDR_NO_RANDOMIZE equal to 0x0040000 which passed in as an argument in personality in above difference logs. So we understand that we can disable the process's ASLR by calling personality syscall with ADDR_NO_RANDOMIZE argument. Lets modify the program from previous article and check is this works.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#include <stdio.h> // printf | |
#include <string.h> // strerror | |
#include <errno.h> // errno | |
#include <unistd.h> // execl | |
#include <sys/ptrace.h> // ptrace | |
#include <sys/user.h> // user_regs_struct | |
#include <sys/personality.h> // personality | |
int | |
main() { | |
// create a child process | |
int pid = fork(); | |
// if error occurs | |
if (0 > pid) { | |
printf("Error during forking: %s\n", strerror(errno)); | |
return 1; | |
} | |
// child process | |
if (0 == pid) { | |
ptrace(PTRACE_TRACEME, 0, 0, 0); | |
personality(ADDR_NO_RANDOMIZE); | |
execl("/bin/ls", "ls", NULL); | |
} | |
// parent process | |
int status; | |
struct user_regs_struct regs; | |
wait(&status); | |
while(1407 == status) { | |
// get registers | |
if (0 != ptrace(PTRACE_GETREGS, pid, 0, ®s)) | |
printf("Error during ptrace: %s\n", strerror(errno)); | |
// if the syscall is close(for example) | |
// wait so we can get memory maps. | |
if (3 == regs.orig_rax) { | |
// This scanf is for waiting for input, | |
// while we cat /proc/pid/maps | |
// to see if it differs from | |
// previous /proc/pid/maps | |
scanf("1"); | |
} | |
// lets the child to continue his work until next sys call or sys exit | |
if (0 != ptrace(PTRACE_SYSCALL, pid, 0, 0) != 0) | |
printf("Error during ptrace: %s\n", strerror(errno)); | |
wait(&status); | |
} | |
return 0; | |
} |
No comments:
Post a Comment