Shellcoding
This page covers the shellcode writing process.
Last updated
This page covers the shellcode writing process.
Last updated
A Shellcode is a small piece of code used to exploit software vulnerabilities. It is named for its original purpose (launching a command shell) but can perform various malicious tasks, such as executing commands or gaining control of a compromised system.
Shellcode is used in system hacking to execute commands on a target machine after exploiting a vulnerability. It helps attackers gain control, escalate privileges, or inject malicious code. Because it runs directly in memory and bypasses security measures, shellcode is a powerful tool for exploitation.
Okay now, before we start writing shellcode, we wanna explore a new assembly/computer architecture concept (sorry)
Now that we know all about syscalls, we can start exploring what types of shellcode we have and what syscalls we need to execute.
We'll explore two types of shellcode, ORW and Execve, let's get into it!
orw shellcode (open-read-write), as the name suggests, is a shellcode that opens a file, reads it, and writes it to the screen. The goal of this section is to write a shellcode to read the file "/tmp/flag"
.
The behavior of the shellcode can be expressed as a pseudocode in C:
syscalls needed to write orw shellcode are listed below.
syscall
rax
arg0 (rdi)
arg1 (rsi)
arg2 (rdx)
read
0x00
unsigned int fd
char *buf
size_t count
write
0x01
unsigned int fd
const char *buf
size_t count
open
0x02
const char *filename
int flags
umode_t mode
The first step is to locate the string "/tmp/flag"
into memory. This will be done by pushing the value 0x67616c662f706d742f (hex representation of "/tmp/flag" in little-endian)
onto the stack. Since values can only be pushed onto the stack in 8-byte units, the process will involve pushing 0x67
first, then pushing 0x616c662f706d742f
. Finally, move rsp to rdi so that rdi points to the string.
Since O_RDONLY is 0, rsi register should be set to 0.
When reading a file, mode has no meaning, so set rdx to 0.
Finally, set rax to 2, the syscall number of open.
The return value of the open
syscall is stored into rax, so the fd is stored in rax. Copy the value of rax to rdi to set the first argument of read
to this value.
rsi points to the address to store the data read from the file. Since 0x30 bytes will be read, assign rsp-0x30
to rsi.
Set rdx to 0x30, the length of the data to be read from the file.
Set rax to 0 to call the read
system call.
Since the output needs to be directed to stdout (the screen), set rdi to 0x1.
rsi and rdx use the same value used in read
.
Set rax to 1 to call the write
system call.
Taken together, they look like this:
CONGRATS! You just wrote your first shellcode!!!
The execve shellcode consists of only the execve system call.
syscall
rax
arg0 (rdi)
arg1 (rsi)
arg2 (rdx)
execve
0x3b
const char *filename
const char *const *argv
const char *const *envp
argv is the argument to be passed to the executable, and envp is the environment variable. Since only sh needs to be run, all the other values can be set to null. On Linux, the default executables are stored in the /bin/ directory, where sh is located in.
The goal is to write shellcode to run execve("/bin/sh", null, null)
. This is not as complex as the orw shellcode written earlier, so try writing it yourself and then compare it to the shellcode below.
Use the pwn.asm()
function to compile assembly into shellcode:
This script converts the assembly into raw shellcode, which can be used in an exploit.
is amazing guys, go read their material :))