Due: November 8, 2016 (note extension!)
Points: 100
For this laboratory exercise, you are to work in teams of 2–3 people. When you turn in your results, be sure to list the team members.
We will use interactive grading for the labs. After the due date, we will schedule 10 minute periods where a team can meet with the instructor or TA. At that meeting, we’ll examine your solution, talk to you about it and ask questions, and may ask that you demonstrate it to us. All members of the team will receive the same grade. So when you come to the meeting, make sure all team members understand how the lab was done, and can answer questions about the lab and the results.
This laboratory exercise has you implement two types of buffer overflows. The first is a simple overflow that causes a parameterless routine to execute. The second is a return-to-libc (or arc) attack.
You will need a virtual machine that is available via the web at http://nob.cs.ucdavis.edu/private/sec-ex3. The user name is “secexer” and the password is “1nteL!” (without the quotes, of course). When you start the virtual machine, you will find two programs, bad.c and realbad.c and two executables, bad and realbad, in your directory. Note that the last executable is setid-to-root.
In the the Homework area of the Canvas class web site is a program bad.c (also see below). This program contains a buffer overflow vulnerability; see the call to gets(3) at line 13. Your job is to exploit the overflow by providing input to the running process that will cause the program to invoke the function trap (which, you may notice, is not called anywhere else). You will know you’ve succeeded when you run the program, give it your input, and it prints “Gotcha!”
The following questions will help guide you. Please turn in your answers to them, a hex dump of the input you use to call trap, and a typescript or screen shot of you running the program bad, giving it your input, and showing its output.
Now you will extend the overflow attack. In the the Homework area of the Canvas class web site is a program realbad.c (also see below). As before, this program contains a buffer overflow vulnerability. Your job is to exploit the overflow by providing input to the running process that will cause the program to invoke the function runcom and cause the system(3) function to be executed with a command embedded in the input you have given. You must pass in a parameter that is a Linux command, which the program will then execute. (I recommend the command id(1).)
Please turn in the following:
If you accidentally delete or change the executables, you can recreate them yourself. First, compile the source using gcc with the option –fno-stack-protector; if you omit the flag, the attempt to overflow the stack will be blocked and so the lab will not work. That’s it for bad. For realbad, once you compile it, do the following:
sudo chown root realbad
sudo chmod 4755 realbad
#include <stdio.h> #include <stdlib.h>int trap(void) { printf("Gotcha!\n"); exit(0); }
int getstr(void) { char buf[12]; gets(buf); return(1); }
int main(void) { getstr(); printf("Overflow failed\n"); return(1); }
#include <stdio.h> #include <stdlib.h>void runcom(char *cmd) { system(cmd); exit(0); }
int getstr(void) { char buf[12]; gets(buf); return(1); }
int main(void) { getstr(); runcom("echo Overflow failed"); return(1); }
You can also obtain a PDF version of this. | Version of October 24, 2016 at 3:35PM |