Stack It
Our team of security analysts recently worked through a peculiar Lumma sample. The dentists helping us advised we floss at least twice a day to help out. He also gave us this weird file. Maybe you can help us out.
- Category: reverse
- Challenge file: stack_it.bin
Solution:
1. Analyze the binary file
$ file stack_it.bin
stack_it.bin: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
Here it indicates the binary has no debugging symbols and couldn’t able to see it functions while debugging
Run the program, it will print Hello, World!
2. Use IDA to disassemble the binary
Here is the simple form of assembly from the binary:
; =============================================================================
; Linux x86 Program
; Performs string operations and prints "Hello, World!"
; =============================================================================
section .text
global start
start:
; Initialize "flag{" prefix
mov byte [byte_804A050], 'f'
mov byte [byte_804A051], 'l'
mov byte [byte_804A052], 'a'
mov byte [byte_804A053], 'g'
mov byte [byte_804A054], '{'
; Set up registers for XOR operation
lea esi, [unk_804A00E] ; Source string 1
lea edi, [unk_804A02E] ; Source string 2
lea edx, [unk_804A055] ; Destination buffer
mov ecx, 0x20 ; Counter (32 bytes)
; XOR loop - combines two strings
xor_loop:
mov al, [esi] ; Load byte from source 1
xor al, [edi] ; XOR with byte from source 2
mov [edx], al ; Store result
inc esi ; Next source 1 byte
inc edi ; Next source 2 byte
inc edx ; Next destination byte
loop xor_loop ; Repeat 32 times
; Add closing brace and null terminator
mov byte [edx], '}' ; Add closing brace
inc edx
mov byte [edx], 0 ; Null terminate
; Push flag onto stack
lea edx, [byte_804A050] ; Start of flag string
mov ecx, 0x24 ; 36 bytes to push
push_loop:
push dword [edx] ; Push 4 bytes at a time
add edx, 4 ; Move to next 4 bytes
loop push_loop
; Print "Hello, World!"
mov edx, 13 ; String length
mov ecx, aHelloWorld ; String pointer
mov ebx, 1 ; STDOUT file descriptor
mov eax, 4 ; sys_write syscall
int 0x80 ; Make syscall
; Exit program
mov eax, 1 ; sys_exit syscall
xor ebx, ebx ; Exit code 0
int 0x80 ; Make syscall
section .data
aHelloWorld db 'Hello, World!', 0
; First source string for XOR operation
unk_804A00E db 0x53, 0x51, 0x51, 0x55, 0x52, 0x5E, 0x56, 0x07
db 0x01, 0x04, 0x0D, 0x02, 0x00, 0x03, 0x56, 0x5B
db 0x0F, 0x50, 0x07, 0x01, 0x53, 0x50, 0x0B, 0x50
db 0x55, 0x00, 0x51, 0x5B, 0x01, 0x06, 0x53, 0x06
; Second source string for XOR operation
unk_804A02E db 0x31, 0x65, 0x63, 0x66, 0x66, 0x38, 0x62, 0x65
db 0x63, 0x65, 0x39, 0x34, 0x38, 0x36, 0x32, 0x38
db 0x37, 0x64, 0x63, 0x37, 0x36, 0x35, 0x32, 0x31
db 0x61, 0x38, 0x34, 0x62, 0x62, 0x37, 0x63, 0x30
section .bss
byte_804A050 resb 1 ; 'f'
byte_804A051 resb 1 ; 'l'
byte_804A052 resb 1 ; 'a'
byte_804A053 resb 1 ; 'g'
byte_804A054 resb 1 ; '{'
unk_804A055 resb 32 ; Buffer for XOR result
resb 1 ; For the closing brace '}'
resb 1 ; For null terminator
The binary will print out the Hello, World!
but it also set up a string which starts wih flag{
and perform XOR operation between 2 32-byte strings with }
. In the end, it will push the entire string into the stack.
3. Use gdb to debug it
Here is the gdb command to retrieve the flag
gdb ./stack_it.bin
info files
b *0x8049000
r
ni
b *0x8049045
c
The explaination:
gdb ./stack_it.bin
: to run gdbinfo files
: in stripped binary,start
often represents the entry pointb *0x8049000
: Set a breakpoint at thestart
memory addressr
: Run till the breakpointni
: Next instruction (I always ni so that I make sure it matches with the disassembler from IDA in order to set the next breakpoint)b *0x8049045
: Set breakpoint until}
is both into the registerc
: To jump next breakpoint
Flag is visible now:
Flag: flag{b4234f4bba4685dc84d6ee9a48e9c106}