Go to file
david942j 98c1a21ed0 fix fail on libc-2.15 2017-03-21 15:38:22 +08:00
bin use optparse instead of optionparser 2017-03-21 13:59:33 +08:00
examples update README.md 2017-02-20 23:44:22 +08:00
lib fix fail on libc-2.15 2017-03-21 15:38:22 +08:00
spec use ANSI color 2017-03-07 16:10:34 +08:00
tasks add gadgets for pwnable.kr's libc 2017-02-14 18:14:19 +08:00
.codeclimate.yml use rbelftools instead of binutils/readelf 2017-03-16 01:13:36 +08:00
.gitignore tiny 2017-02-23 19:59:39 +08:00
.rubocop.yml it looks good 2017-02-16 23:19:23 +08:00
.travis.yml use optparse instead of optionparser 2017-03-21 13:59:33 +08:00
Gemfile add executable and fix codeclimate 2017-02-07 17:54:25 +08:00
Gemfile.lock add rvm 2.1.0 2017-03-21 13:54:23 +08:00
LICENSE Initial commit 2017-02-07 16:03:34 +08:00
README.md bump 1.3.3 2017-03-16 01:17:57 +08:00
Rakefile emulators/instruction and lambda 2017-02-16 22:19:13 +08:00
builds_list add gadgets for pwnable.kr's libc 2017-02-14 18:14:19 +08:00
one_gadget.gemspec add rvm 2.1.0 2017-03-21 13:54:23 +08:00

README.md

Build Status Downloads Code Climate Issue Count Test Coverage Inline docs MIT License

One Gadget

When playing ctf pwn challenges we usually need the one-gadget of execve('/bin/sh', NULL, NULL).

This gem provides such gadget finder, no need to use IDA-pro every time like a fool.

This work provides the command-line tool one_gadget for easy usage.

Note: Supports amd64 and i386!

Install

Available on RubyGems.org!

gem install one_gadget

Implementation

OneGadget use simple self-implement symbolic execution to find the constraints of gadgets.

The article introducing how I developed this tool can be found here.

Usage

Command Line Tool

one_gadget
# Usage: one_gadget [file] [options]
#     -b, --build-id BuildID           BuildID[sha1] of libc.
#     -f, --[no-]force-file            Force search gadgets in file instead of build id first.
#     -r, --[no-]raw                   Output gadgets offset only, split with one space.
#     -s, --script exploit-script      Run exploit script with all possible gadgets.
#                                      The script will be run as 'exploit-script $offset'.

one_gadget -b 60131540dadc6796cab33388349e6e4e68692053
# 0x4526a execve("/bin/sh", rsp+0x30, environ)
# constraints:
#   [rsp+0x30] == NULL
# 
# 0xef6c4 execve("/bin/sh", rsp+0x50, environ)
# constraints:
#   [rsp+0x50] == NULL
# 
# 0xf0567 execve("/bin/sh", rsp+0x70, environ)
# constraints:
#   [rsp+0x70] == NULL
# 
# 0xcc543 execve("/bin/sh", rcx, r12)
# constraints:
#   rcx == NULL || [rcx] == NULL
#   r12 == NULL || [r12] == NULL
# 
# 0xcc618 execve("/bin/sh", rax, r12)
# constraints:
#   rax == NULL || [rax] == NULL
#   r12 == NULL || [r12] == NULL
# 
# 0xf5b10 execve("/bin/sh", rcx, [rbp-0xf8])
# constraints:
#   [rbp-0xf8] == NULL || [[rbp-0xf8]] == NULL
#   rcx == NULL || [rcx] == NULL

one_gadget /lib/i386-linux-gnu/libc.so.6
# 0x3ac69 execve("/bin/sh", esp+0x34, environ)
# constraints:
#   esi is the address of `rw-p` area of libc
#   [esp+0x34] == NULL
# 
# 0x5fbc5 execl("/bin/sh", eax)
# constraints:
#   esi is the address of `rw-p` area of libc
#   eax == NULL
# 
# 0x5fbc6 execl("/bin/sh", [esp])
# constraints:
#   esi is the address of `rw-p` area of libc
#   [esp] == NULL

Combine with exploit script

Pass your exploit script as one_gadget's arguments, it can try all gadgets one by one, so you don't need to try every possible gadgets manually.

one_gadget ./spec/data/libc-2.19.so -s 'echo "offset ->"'

--script

Directly use in script

require 'one_gadget'
OneGadget.gadgets(file: '/lib/x86_64-linux-gnu/libc.so.6')
# => [283242, 980676, 984423, 836931, 837144, 1006352]
# or in shorter way
one_gadget(file: '/lib/x86_64-linux-gnu/libc.so.6')
# => [283242, 980676, 984423, 836931, 837144, 1006352]

# from build id
one_gadget(build_id: '60131540dadc6796cab33388349e6e4e68692053')
# => [283242, 980676, 984423, 836931, 837144, 1006352]

Screenshots

Search gadgets from file

64 bit

from file

32 bit

from file

Fetch gadgets from database

build id