KAIST-IS521 / 2018s-gitctf-team5

1 stars 0 forks source link

exploit-bug2 #30

Closed sunnyeo closed 6 years ago

sunnyeo commented 6 years ago

-----BEGIN PGP MESSAGE----- Version: GnuPG v1

hQEMAy8nZUIPGP0nAQgAgWVbQf4Ssb1MoR5XvwafYhbNWU6Ru5M+IfyjtpUGTo8D 7+PEsxTEnUkyK9xh2RPAD4SXndGLKOSUneaTI0pLl3Qal3aJkT/MTnRtoHuTa9Jk 7vawxDNlR2Aayxj/m/xAol74UC6K+YfSV7Z2G1/fO8DrND/w3rSWSDqRo8v2pWD/ +CAUUrdbD+bKiSL2svK0TTFN7ri0W4XzalYtaPKnRDuRxWz+XXUf6mko9z+9r/LQ zlSgrgYtehdNJ5vupRqkVyAMScKtKAboT5SYk67PdQlEttK6HjGlEqDaykVRcapU L4timZDsRtoXEjB8oxy2fgvYAgio54rQadCl7HDy04UBjAPcMgCV6N35oQEMANgC 6efbgEtVaLbw2YqNL+ZAuWLtJYFULuwd3U2zW8CRmlsKOnstLD+D7wL0B+jAV9Zh 3CtSQ+dKRqBc2XyJJF4b0VZ4qZUe1r7tWK8MZGZ5q3wJuaJp8Zd+XnsDh598ubcU Ix1cDyu3m35HrmxL81ATl88lTeLwPRIEmsP5OpZky/SmFhhHsd8JQa1EgoaJJZEa bUttVwzvXk1AN6SeNPeskNuzdWL/CVbTWVVRDvQzrL6ZKKcDwNgmjXfduX6Hnz2y hDaqE3+Wc9YNQXHoEwcbPXmbY27wDjyn/ey4QCIWZqLV5z6u6YTMP5H8y2nK3ODa oJmzg5S6BtS+vbK4B6yZEQc4aGHoIRn2FKcvCc4UrIDq1/xsYMsYzjPr3cFyY+h5 ykhYJYUWFj6t+vUN/f26706Dt6w9NTCKuq9fqZ1212CXa008LqAhFJUz6hfHBP/p XXygpLybAmceN4f9vLpz+WABFhABTSL8yeNCTyfeCqwmqCBqJs0eIjAG+3oeaNLr AU1FrPeisIFURfCv54N4vtXw6w8+s0getLV4nR4PyPH/h6QADRQ+dzJFFMtrx/zk fvhydsFfRBmMOS9WIty50A/ivD+xwcQ01JuiK0s68fwFJwkVBmQcr7KI3965fFYm efvsZtINJj3x4sY5XIiJquD8Kt3W/8YCNlzW9eTq7DS+/c9sB0tfOThA1uWxFycm B+yx3fUXWOyc4MlePgjAenO0uugiC+FV6SvQTh63sn1yGsgVODOAnHYMGaP51jb4 W0LWueF3GNiPOvlaCcb6qjjC+Wv+YOE7aUL0nHJqyK8+m4yYN7hWriGJVPm1lqul sjzJt0JkflJe1mbxV79qqTHG47Q+uDDuuQ+tP2fe4cQwBwWAo/TNkX6NN9koXfQh jAcihlMp1fsLB578qMaFJaRT0+xAAKo6r2oQb5XFqUyCAmU9aW/UkSGrxXvjxZl+ Bhx7VvTsw/iUpZ0t18zjEanqCfFN6B1cgv/nI97Li9/1H1tuteiZZBVLa2v7Hfo1 t/mQRKVDpFvFYTRZjArx9XBVyZZ6ySw0+aFriXQn9F4Eli9M2N1UzwbbePAl+GlJ zzpzLN9LfLuGGUxbx6zs1QX2j+gtu5kTG5WGN9PIxg9ulddCwSrFZMTYQ5MQt0oY G4ireva1Nru7bhS7pwJohWmKEMLAsVTak4cKO5yuEX1KiSQa6v4rnIYyBHdxJVjQ Lc3RRA090KSkQBkhgb7dcTvgBLjFq373u+q3TxSG3KOCbKLFZFibz8FsxNLKc4wv kSgQvhStzIjQY2kghWFUFCQQhPsH3G3f38a5R0AW1kqpF2mlraXykdFXNusRaLLz 28W7FFei63U7Ktpdd+e3OjZPEpNmzdQ3wVvwG8VRe8YTlxoOzaDA/K0FTPbLRW2R XZiBjpwCHbkRFjxY/SkEIGMEr+FUTNgObLo2wCzJ5kYdsoDuAOm1Ev8H3caiu9h3 Hk2S/yrmI4YgwGNKhGgjywUT4bgOmqLqxWsCSce86VGuH1HswItGjURX8yRIws4c l/Tb280VweIvWxifVaw+kR7GhkOmINUpK9CnvLyFM7+hMoDBqINukw7dSwumA+mm ElWNVvs+eQna40HJcEHpfX1PXxwES8hBvnK+qC+GEUJvBnJmzRb+tL0J/sRiK21q uRtPxdEPXe09EYYG5jidv4tPlPvFrA4izwT2xAsKPj1DHDH7qwJh4JOHoZ8dt05J Euej0hSXsD7tYMgXsk5llprRNfYgssTErcY7PRrKf9QyTfo6JFmnAh4TDw3M1GqS CWXEjub84AiWdD3yuPuXtEkBHBBDGuhSk31iFCxmTRLofrqNYkQHGl+elfgz3yLT JGWgl+d6efXsqIVUE7oHmEM4NoduOFxsga59jZLDITKcNGZSc4/gOk5OlfmH4zLU 5LxQTa5wjGmLSlvzIQ5YStRIzTtYOSTfO2Sjsy28ZzQfG5309Hgu09bXNuYTION1 2lGX4kwyA1glr+8YoRowEB7F7O3LOLUzAb1kBMe8jJFpDGGJxjeMm4x80GUC8FxG if2wWgb7wxgcPF/SOSkGrYdNqB2YuMPaRtoXOoxPCoLL87xetSiNljOW718cxfaB nhwDtoDLdYHBHpAYE2m1hYRB3r87c8j7mFV19DUnbL/lnCY4jKq6xLWjaPTOgUeu oPY082Qf4POamosTaXgg2ZXH3qjW6uKqwzEH21ndhiMCmRg+aIznId9IFM1xrisN vpLuuWaI9f92sObch5AO75bnbF2Ub65TiL/1tLdK6fnh36daWvVfHRirOt/LAvLp ETmJgcK5Huy7UWJ+KXMvCWnpZH1R2RChn7ZPW1fMvAKe44k6WLYR5Z5wR/VZoiyL hCBQkcn7e7rEFrmrMu7VAqTCOzE/gpWLeJAP4HfNWqz5H0vwdvcdLfVGlM8ZOQeh 8cSzYuX/z2eFakucrWeStiUHw1rrJlveps5JGLPg86pWZ/EMaycw3/ZE/imPWB6Z 44C/OUUi5gXcjxm7KEryJuOSae9OPVJ4vkRqkNpO6G/rpm70RzWYpnn5oDVze/Ob xjRdNkoADkvJJ5fLfDFxBQbMwkT6UvfxSLAf1aVUJ899Z77TBtmd5jfinorS8ZTu uXrdIeav2NqXT7S9XonmbmEwvnje9LJhn1vB5F8rpymNAWB759x8DFEenLJgCzl6 XAQ8KfRAQ+/RwLBYdayqDeLZQhAri+xQVMksQN6n53lQ+86PF11Pxr/2HYh3tpbs sFpKRyOEPDubQeHnRyqg138Zgtwx0TksuB1QrdzJ1BHRWvoU0Heed/7+8tt2RBV1 1/SJIL8PI5dW6vnUr3JLMfAvWSZ55Immeul/8VQmUASrRIC1r7zHVobUjE70dQ45 5yj3N6T2rVrzrCkoCuhez2G8e74Bem3gnXszy+Ggk53GBa/7AvlaIblyQKQ/KUc+ cacCP3uSUUwoAmq1VzIa3+BLrT1d/tDw4gR5S0zZlvPX+5c0ox++SPzdup047rMs WcvaRYYI4BqfQ0iUiPJzhmYgCY3upD9bzEeXgAJzUSFB3KLN7C27WdA7atosEz6h 1eqm0wV0ra2vBKeo2/bTKp1wIBY89Zht0ySGCT1xT3CVUzr8d/8c1gu+OwvnazDk 4q+eBzivLe2k0DPnLwTvf5gIoG9G4SZy/PPGBrwm7mEz8HchHn160trqwEk3Qz0J jcc0WdpXCYkXMfSsWsWbh6aKeJoGmjX+0aGDlJ9RyMbAsy85SOB5EyACzDbSCt1y RonaZaPos1mITjfWaj9QI53bbrVs0mIR6gE0uFOq+DZWT0MqEPd6Y8DeJwf0w8nV feFrT1Qs+qysU8guM3IolZvxw/ceO+Sq8gHV4++SAa5N52s1jgagwc9O+O9cCMYm z37hVZGvuXrQQcOLZiefB0CUOsun2g/VGIHKsmcw/hHlg3VyJ/O5s6wLBTCPVICt 4Ae4BUHIE/nOL64dG+MxnndfQlzVZ3IESqhs0Fb+bGTA0bhJ6Xv/qMiqXEMhUmq0 bXKL60kX9Gu7gEulxUG77f9VPlZ1oZT58MIonpWWY2F/kM8rWoqbXyKR8U4yyo28 vMsExpJyllwPwauUCgPK9d3+j6Xfvbxm0LjNhfkaq9vqFDFezkp3ZxnaUEplcG2i mSH2U0mk8Yzc7cdEzokv8582DpMZh6tpuYQ8ESgLJLG+XgzogDNmxxFdBtr8cKe5 M/c42pafYEUnoK/RPxkqZafKtyXl =GQF8 -----END PGP MESSAGE-----

softsec-is521 commented 6 years ago
About exploit-bug2 (exploit-service branch)
[*] Starting service from 2018s-gitctf-team5 (branch '8a0b39b831e3bb1efdc845658089c0ae66a36fd7')
Sending build context to Docker daemon  2.193MB
Step 1/33 : FROM debian:latest
---> 8626492fecd3
Step 2/33 : MAINTAINER k1rh4 <k1rh4.lee@gmail.com>
---> Using cache
---> 8e9e3881ec66
Step 3/33 : RUN         sed -i 's/deb.debian.org/ftp.daumkakao.com/g' /etc/apt/sources.list
---> Using cache
---> d58cb6fc7f0d
Step 4/33 : RUN apt-get update
---> Using cache
---> f74c65dc9bfe
Step 5/33 : RUN apt-get install -y xinetd
---> Using cache
---> 845d6f85baa1
Step 6/33 : RUN apt-get install -y libsqlite3-dev
---> Using cache
---> ff66c0e5a29c
Step 7/33 : RUN apt-get install netcat -y
---> Using cache
---> df491e9bff6a
Step 8/33 : RUN apt-get install net-tools -y
---> Using cache
---> 93debded14f4
Step 9/33 : RUN apt-get install -y procps
---> Using cache
---> c472a4cdaf3f
Step 10/33 : RUN useradd -d /home/load load -s /bin/bash
---> Using cache
---> 88d6cfc64fa7
Step 11/33 : RUN mkdir /home/load
---> Using cache
---> 82e3bcea59ce
Step 12/33 : RUN chown -R root:load /home/load
---> Using cache
---> 5aa04924d1ab
Step 13/33 : RUN chmod 750 /home/load
---> Using cache
---> f51da5c3a761
Step 14/33 : ADD ./BUILD/prob /home/load/
---> Using cache
---> 5fa7dbc08b05
Step 15/33 : ADD ./BUILD/modify_usr /home/load/modify_usr
---> Using cache
---> 80d1f6379516
Step 16/33 : ADD ./BUILD/run.sh /home/load/run.sh
---> Using cache
---> 906323f975f1
Step 17/33 : ADD ./BUILD/usr.db /home/load/usr.db
---> Using cache
---> ba9251f94caa
Step 18/33 : RUN chown root:root /home/load/*
---> Using cache
---> bb326fbfe03f
Step 19/33 : RUN chmod 755 /home/load/run.sh
---> Using cache
---> 693348cb1317
Step 20/33 : RUN chmod 755 /home/load/modify_usr
---> Using cache
---> e9b9fc8366c5
Step 21/33 : RUN chmod 755 /home/load/prob
---> Using cache
---> 2b467833030a
Step 22/33 : RUN chmod 766 /home/load/usr.db
---> Using cache
---> e09ce7454b7a
Step 23/33 : RUN mkdir -p /var/ctf/
---> Using cache
---> 836e043d7be7
Step 24/33 : COPY ./flag    /var/ctf/flag
---> c1a5d2a05db1
Step 25/33 : RUN chown root:load /var/ctf/flag
---> Running in 6760260e1ebf
Removing intermediate container 6760260e1ebf
---> 6dc6336b50b0
Step 26/33 : RUN chmod 440 /var/ctf/flag
---> Running in 7308878ad721
Removing intermediate container 7308878ad721
---> 774db3ebe644
Step 27/33 : ADD ./SRC/load.xinetd /etc/xinetd.d/load
---> 87f922212726
Step 28/33 : WORKDIR /home/load
Removing intermediate container 36a260e047a3
---> 58b62d1e4a7b
Step 29/33 : ADD ./SRC/start.sh /start.sh
---> 0883194cd1c4
Step 30/33 : RUN chmod +x /start.sh
---> Running in 27582ca5eb7b
Removing intermediate container 27582ca5eb7b
---> c12d7eed0afc
Step 31/33 : RUN su load
---> Running in 788fe19b2087
Removing intermediate container 788fe19b2087
---> 936b2eaa1130
Step 32/33 : RUN /start.sh &
---> Running in 7aecce4abd06
Removing intermediate container 7aecce4abd06
---> 661fbfea3b60
Step 33/33 : ENTRYPOINT /start.sh
---> Running in 570f97f0c255
Removing intermediate container 570f97f0c255
---> 2aad8927e054
Successfully built 2aad8927e054
Successfully tagged 2018s-gitctf-team5-8a0b39b831e3bb1efdc845658089c0ae66a36fd7:latest
5dba8f73a59346e20d15350bdd22a96c9e81ac6b118d6d21cb61efbbf0cd6424
[*] Started service successfully
[*] Running exploit
Sending build context to Docker daemon   7.68kB
Step 1/6 : FROM debian:latest
---> 8626492fecd3
Step 2/6 : RUN sed -i 's/deb.debian.org/ftp.daumkakao.com/g' /etc/apt/sources.list
---> Using cache
---> 45fa25df3fa6
Step 3/6 : RUN apt-get update
---> Using cache
---> 0845a94ffa3b
Step 4/6 : RUN apt-get install -y python
---> Using cache
---> 371c580f05da
Step 5/6 : COPY /ex.py /bin/exploit
---> Using cache
---> cd91d721453e
Step 6/6 : RUN chmod 755 /bin/exploit
---> Using cache
---> 6c5e0fb7d00e
Successfully built 6c5e0fb7d00e
Successfully tagged exploit-8a0b39b831e3bb1efdc845658089c0ae66a36fd7:latest
0 
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 Y
[*] Failed to run exploit

==========================
[*] Exploit returned : None
[*] Solution flag : 478QmNOv7l
[*] Exploit returned a wrong flag string

[*] The exploit did not work.