Dragon CTF 2021 Rev - `Run of the Mill` write-up
Our Team
Water Paddler
got 7 th position in `DragonCTF 2021`.
Run of the Mill
Given a executable, seems to be constructed directly from the assembly (Only entry0 function).Takes an input (flag), make operations on that input bytes and finally compare those input bytes with the stored 64 bytes, if equal -> prints "Well Done"
Goal is to recover the flag based on operations (encryption), and final bytes.
But manual analysis on those operations is very difficult (nearly 7.5k+ instructions for those operations)
Analyzing the problem
One of my teammate mentioned that, even though instructions are many, opcodes used are very less`['ror', 'xor', 'mov', 'add', 'sub', 'movq', 'pxor', 'rol']`
Then got the idea of scripting : Writing a script for decrypting the encrypted flag bytes, automatically based on operations on Assembly
-> Dumped those assembly instructions (of encryption) into a text file, from IDA
-> Dumped the memory (0x000412000 - 0x00041209F) of runofmill into a python script
Part-1 : Script for simulating asm instructions
In order to reverse that encryption automatically, need a script to first (parse , execute) those instructions.
Main Challanges faced in this part :
Part-2 : Script for Reversing the encryption
By doing those operations (used for encryption) on the encrypted bytes in the reverse order, we can recover the flag.
Main Challanges faced in this part :
By Observing the assembly instructions i have noticed three patterns in the assembly instructions, which are used for encryption.
Type - 2 is dummy instructions , just for obfuscation, we need only Type-1, Type-3 instrucions.
Implemented block separation, reverse logic for opcodes, placed the final encrypted bytes at input bytes address.
Finally
The script : I have created for recovering flag, by putting all together.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import re | |
class RAM_Memory: | |
bytes_arr = [] | |
dtypes = {'byte' : 1, 'word' : 2, 'dword' : 4, 'qword' : 8} | |
def __init__(self, int64_arr) -> None: | |
for num in int64_arr: | |
for i in range(8): | |
self.bytes_arr.append(num & 0xff) | |
num = num >> 8 | |
def get(self, addr, dtype = 'byte'): | |
if dtype not in self.dtypes: | |
raise Exception("Invalid data type", dtype) | |
count = self.dtypes[dtype] | |
return self.read_data(addr, count) | |
def set(self, addr, value, dtype = 'byte'): | |
if dtype not in self.dtypes: | |
raise Exception("Invalid data type", dtype) | |
count = self.dtypes[dtype] | |
value = value % (2**(count*8)) | |
return self.write_data(addr, value, count) | |
def read_data(self, addr, count): | |
num = 0 | |
for i in range(count): | |
num = num | ( self.bytes_arr[addr + i] << 8*i) | |
return num | |
def write_data(self, addr, data, count): | |
for i in range(count): | |
self.bytes_arr[addr + i] = (data & 0xff) | |
data = data >> 8 | |
class Instruction: | |
def __init__(self, ins) -> None: | |
temp = ins.split(' ') | |
self.addr = temp.pop(0) | |
# ['ror', 'xor', 'mov', 'add', 'sub', 'movq', 'pxor', 'rol'] | |
self.operation = temp.pop(0) | |
op1, op2 = ' '.join(temp).strip().split(' ; ')[0].split(',') | |
self.dst = Operand(op1) | |
self.src = Operand(op2) | |
if (self.dst.type == '' or self.src.type == ''): | |
raise Exception("Invalid Intrsution : ", ins) | |
def execute(self): | |
if self.operation == 'add': | |
res = self.dst.get() + self.src.get() | |
self.dst.set(res) | |
elif self.operation == 'sub': | |
res = self.dst.get() - self.src.get() | |
self.dst.set(res) | |
elif self.operation == 'xor' or self.operation == 'pxor': | |
res = self.dst.get() ^ self.src.get() | |
self.dst.set(res) | |
elif self.operation == 'mov' or self.operation == 'movq': | |
res = self.src.get() | |
self.dst.set(res) | |
elif self.operation == 'ror': | |
if self.dst.type != 'memory' or self.src.type != 'immediate': | |
raise Exception("Invalid Operands : for ror operation ", self.dst.type, self.src.type) | |
res = right_rotate(self.dst.get(), self.src.get(), self.dst.dtype ) | |
self.dst.set(res) | |
elif self.operation == 'rol': | |
if self.dst.type != 'memory' or self.src.type != 'immediate': | |
raise Exception("Invalid Operands : for ror operation ", self.dst.type, self.src.type) | |
res = left_rotate(self.dst.get(), self.src.get(), self.dst.dtype ) | |
self.dst.set(res) | |
else: | |
raise Exception("Invalid Opearation : ", self.operation) | |
def reverse(self): | |
if self.operation == 'add': | |
res = self.dst.get() - self.src.get() | |
self.dst.set(res) | |
elif self.operation == 'sub': | |
res = self.dst.get() + self.src.get() | |
self.dst.set(res) | |
elif self.operation == 'xor' or self.operation == 'pxor': | |
res = self.dst.get() ^ self.src.get() | |
self.dst.set(res) | |
elif self.operation == 'mov' or self.operation == 'movq': | |
res = self.src.get() | |
self.dst.set(res) | |
elif self.operation == 'ror': | |
if self.dst.type != 'memory' or self.src.type != 'immediate': | |
raise Exception("Invalid Operands : for ror operation ", self.dst.type, self.src.type) | |
res = left_rotate(self.dst.get(), self.src.get(), self.dst.dtype ) | |
self.dst.set(res) | |
elif self.operation == 'rol': | |
if self.dst.type != 'memory' or self.src.type != 'immediate': | |
raise Exception("Invalid Operands : for ror operation ", self.dst.type, self.src.type) | |
res = right_rotate(self.dst.get(), self.src.get(), self.dst.dtype ) | |
self.dst.set(res) | |
else: | |
raise Exception("Invalid Opearation : ", self.operation) | |
class Operand: | |
type = '' | |
def __init__(self, string) -> None: | |
string = string.strip() | |
temp = re.match(r'^([0-9A-Fa-f]+)h$', string) | |
if temp: | |
self.type = 'immediate' | |
self.value = int(temp.groups()[0], 16) | |
return None | |
temp = re.match(r'^([0-9]+)$', string) | |
if temp: | |
self.type = 'immediate' | |
self.value = int(temp.groups()[0]) | |
return None | |
temp = re.match(r'^((dword|word|byte) ptr )?qword_4120([0-9a-fA-F]+)\+?([1-9])?$', string) | |
if temp: | |
temp = temp.groups() | |
self.type = 'memory' | |
self.addr = int(temp[2], 16) + int(temp[3] or '0') | |
self.dtype = temp[1] or 'qword' # byte, word, dword, qword | |
return None | |
temp = string.lower() | |
if temp in REGISTERS: | |
self.type = 'register' | |
self.reg = REGISTERS[temp] | |
return None | |
raise Exception("Invalid operand : (Add it) -> ", string) | |
def get(self): | |
if self.type == 'immediate': | |
return self.value | |
if self.type == 'register': | |
return self.reg.get() | |
if self.type == 'memory': | |
return MEMORY.get(self.addr, self.dtype) | |
def set(self, value): | |
if self.type == 'register': | |
return self.reg.set(value) | |
if self.type == 'memory': | |
return MEMORY.set(self.addr, value, self.dtype) | |
if self.type == 'immediate': | |
raise Exception("Invalid write : Not allowed on immediate val") | |
def __str__(self) -> str: | |
return "<Operand - ({})>".format(self.type) | |
class Register: | |
def __init__(self, name, value = 0) -> None: | |
self.name = name | |
self.value = value | |
def get(self): | |
return self.value | |
def set(self, value): | |
self.value = value & 0xffffffffffffffff | |
def right_rotate(value, rotations, dtype): | |
total_bits = MEMORY.dtypes[dtype]*8 | |
bits = [] | |
for i in range(total_bits): | |
bits.insert(0, value & 1) | |
value = value >> 1 | |
for i in range(rotations): | |
bits.insert(0, bits.pop()) | |
res = 0 | |
for bit in bits: | |
res = (res << 1) | bit | |
return res | |
def left_rotate(value, rotations, dtype): | |
total_bits = MEMORY.dtypes[dtype]*8 | |
bits = [] | |
for i in range(total_bits): | |
bits.insert(0, value & 1) | |
value = value >> 1 | |
for i in range(rotations): | |
bits.append(bits.pop(0)) | |
res = 0 | |
for bit in bits: | |
res = (res << 1) | bit | |
return res | |
REGISTERS = { | |
'rax' : Register('rax', 0), | |
'rbx' : Register('rbx', 0), | |
'rcx' : Register('rcx', 0), | |
'rdx' : Register('rdx', 0), | |
'rdi' : Register('rdi', 0), | |
'rsi' : Register('rsi', 0), | |
'rbp' : Register('rbp', 0), | |
'r8' : Register('r8' , 0), | |
'r9' : Register('r9' , 0), | |
'r10' : Register('r10', 0), | |
'r11' : Register('r11', 0), | |
'r12' : Register('r12', 0), | |
'r13' : Register('r13', 0), | |
'r14' : Register('r14', 0), | |
'r15' : Register('r15', 0), | |
'mm0' : Register('mm0', 0), | |
} | |
''' | |
Orginal Data while execution : | |
0x000412000 - 0x00041203F (Input bytes) | |
0x000412050 - 0x00041208F (Encrypted flag bytes) | |
0x000412090 - 0x00041208F (Used as Temp variable) | |
''' | |
data_dump = [ | |
0x4141414141414141, # 0x000412000 | |
0x4141414141414141, # 0x000412008 | |
0x4141414141414141, # 0x000412010 | |
0x4141414141414141, # 0x000412018 | |
0x4141414141414141, # 0x000412020 | |
0x4141414141414141, # 0x000412028 | |
0x4141414141414141, # 0x000412030 | |
0x4141414141414141, # 0x000412038 | |
0, # 0x000412040 | |
0, # 0x000412048 | |
0x0F299168089A9CB5, # 0x000412050 | |
0x0DA5C93F471FB1EBD, # 0x000412058 | |
0x0E28D416C7710940D, # 0x000412060 | |
0x0DB14E1950AA5265E, # 0x000412068 | |
0x7107E77BE4090B25, # 0x000412070 | |
0x17B4B25CC1F2D34E, # 0x000412078 | |
0x92C4981E353DAA30, # 0x000412080 | |
0x0CCCEB011CC6933F4, # 0x000412088 | |
0 # 0x000412090 | |
] | |
''' | |
Orginal Data while execution : | |
0x000412000 - 0x00041203F (Encrypted target bytes) | |
0x000412090 - 0x00041208F (Used as Temp variable) | |
''' | |
modified_mem = [ | |
0x0F299168089A9CB5, # 0x000412000 | |
0x0DA5C93F471FB1EBD, # 0x000412008 | |
0x0E28D416C7710940D, # 0x000412010 | |
0x0DB14E1950AA5265E, # 0x000412018 | |
0x7107E77BE4090B25, # 0x000412020 | |
0x17B4B25CC1F2D34E, # 0x000412028 | |
0x92C4981E353DAA30, # 0x000412030 | |
0x0CCCEB011CC6933F4, # 0x000412038 | |
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, # 0x000412040 to 0x000412088 | |
0 # 0x000412090 | |
] | |
def dump_mem(): | |
print("====> Memory DUMP : 0x000412000 - 0x00041209F") | |
for i in range(19): | |
print(".data:004120{:02x} -> 0x{:016x}\n".format(i*8, MEMORY.get(i*8, 'qword'))) | |
assembly = open("block-asm.txt").read() | |
# Used for Simulation of Given Assembly instructions | |
# MEMORY = RAM_Memory(data_dump) | |
# for stat in assembly.split('\n'): | |
# if not stat: continue | |
# ins = Instruction(stat) | |
# ins.execute() | |
# dump_mem() | |
MEMORY = RAM_Memory(modified_mem) | |
code_blocks = [] # For finding operations from assembly | |
block = [] # Each block stores one operation | |
for stat in assembly.split('\n'): | |
if not stat: continue | |
ins = Instruction(stat) | |
block.append(stat) | |
if ins.dst.type == 'memory' and ins.dst.addr < 0x40: | |
code_blocks.append(block) | |
block = [] | |
continue | |
if ins.src.type == 'memory' and ins.src.addr < 0x40 and ins.dst.reg.name != 'mm0': | |
block = [] | |
continue | |
# Execuating (Reverse of Operations) in reverse order (bottom to top) on Encrypted flag bytes [Decrypting]. | |
while code_blocks: | |
block = code_blocks.pop() | |
for stat in block: | |
ins = Instruction(stat) | |
ins.reverse() | |
flag_bytes = [] | |
for i in range(0x40): | |
temp = MEMORY.get(i) | |
if temp == 0: break | |
flag_bytes.append(temp) | |
print("[+] Flag : ", bytes(flag_bytes).decode()) |
By running the script :
Flag : DrgnS{SoManyInstructionsYetSoWeak}
Comments
Post a Comment