Wednesday, 15 January 2014

[HACKYOU 2014] Crypto200 - HashMe

So in this challenge, you are given a python script and the address of a server where the script is being run. Upon inspecting the script you can see that it allows you to register and also to log in. When a user logs in as an administrator, the script will automatically spit out the password. However, in the script given to us, the KEY and SALT have both been removed.

#!/usr/bin/python
from math import sin
from urlparse import parse_qs
from base64 import b64encode
from base64 import b64decode
from re import match
SALT = ''
USERS = set()
KEY = ''.decode('hex')
def xor(a, b):
return ''.join(map(lambda x : chr(ord(x[0]) ^ ord(x[1])), zip(a, b * 100)))
def hashme(s):
#my secure hash function
def F(X,Y,Z):
return (~X & Z) & 0xFFFFFFFF
def G(X,Y,Z):
return ((X & Z) | (~Z & Y)) & 0xFFFFFFFF
def H(X,Y,Z):
return (X) & 0xFFFFFFFF
def I(X,Y,Z):
return (Y ^ (~Z | X)) & 0xFFFFFFFF
def ROL(X,Y):
return (X << Y | X >> (32 - Y)) & 0xFFFFFFFF
A = 0x67452301
B = 0xEFCDAB89
C = 0x98BADCFE
D = 0x10325476
X = [int(0xFFFFFFFF * sin(i)) & 0xFFFFFFFF for i in xrange(256)]
for i,ch in enumerate(s):
k, l = ord(ch), i & 0x1f
A = (B + ROL(A + F(B,C,D) + X[k], l)) & 0xFFFFFFFF
B = (C + ROL(B + G(C,D,A) + X[k], l)) & 0xFFFFFFFF
C = (D + ROL(C + H(D,A,B) + X[k], l)) & 0xFFFFFFFF
D = (A + ROL(D + I(A,B,C) + X[k], l)) & 0xFFFFFFFF
print '%x %x %x %x'%(B,A,D,C)
return ''.join(map(lambda x : hex(x)[2:].strip('L').rjust(8, '0'), [B, A, D, C]))
def gen_cert(login):
global SALT, KEY
s = 'login=%s&role=anonymous' % login
s += hashme(SALT + s)
s = b64encode(xor(s, KEY))
return s
def register():
global USERS
login = raw_input('Your login: ').strip()
if not match('^[\w]+$', login):
print '[-] Wrong login'
return
if login in USERS:
print '[-] Username already exists'
else:
USERS.add(login)
print '[+] OK\nYour auth certificate:\n%s' % gen_cert(login)
def auth():
global SALT, KEY
cert = raw_input('Provide your certificate:\n').strip()
try:
cert = xor(b64decode(cert), KEY)
auth_str, hashsum = cert[0:-32], cert[-32:]
data = parse_qs(auth_str, strict_parsing = True)
x = hashme(SALT + auth_str)
s = auth_str+x
print b64encode(xor(s, KEY))
if hashme(SALT + auth_str) == hashsum:
data = parse_qs(auth_str, strict_parsing = True)
print '[+] Welcome, %s!' % data['login'][0]
if 'administrator' in data['role']:
flag = open('flag.txt').readline()
print flag
else:
print '[-] Auth failed'
except:
print '[-] Error'
def start():
while True:
print '======================'
print '[0] Register'
print '[1] Login'
print '======================'
num = raw_input().strip()
if num == '0':
register()
elif num == '1':
auth()
start()
view raw crypto200.py hosted with ❤ by GitHub


When a user registers, he is given a certificate that he can use to log in to the system; this certificate consisting of the user's username, role, hash of the username and role, all xor'ed against the KEY and then base64 encoded. Since we have access to the certificate post-xor and we do know what part of the plaintext was ( the username and the role ), we can recover the KEY. We can manipulate the username to be as long as necessary in order to recover the entire key.

import base64
login = 'a'*500
s = 'login=%s&role=anonymous' % login
cert = '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'
cert_bytes = base64.b64decode(cert)
auth_str_bytes = cert_bytes[:len(s)]
key = map(lambda (x,y): (ord(x)^ord(y)), zip(auth_str_bytes,s) )
key = key[:50]
key = ''.join(map(lambda x: str(hex(x))[2:].rjust(2,'0'),key))
print key
view raw key_calc.py hosted with ❤ by GitHub


Using this method, I found the key to be 28c1150dac6704583d6c1125a72d3c87241e7f5497e9b80c78f4ce2b08dcab2b0df20be0abde0b17512a935bc765607cf5e5 when hex encoded.

Now that we have the key, we're free to obtain the auth string and the hash from any certificate issued by that particular script on that server. Looking closely at the code, it doesn't seem likely that obtaining the SALT is possible but we do see that the code searches for "administrator" in the data['role'] list. What this tells us is that it is possible for us to successfully pass the admin check even if we have more than one role present in our auth string.

It turns out that we can simply add "&role=administrator" to the end of the auth string and that works out fine. However, we still have to deal with the md5 hash of that auth string. Luckily for us, the hashing algorithm used in the script is vulnerable to a length extension attack. We can use the hash given to us in the certificate ( using the key we recovered earlier ), to discover the internal state ( A,B,C,D ) of the hashing function at the end of its operation. We can then use that state in place of the IV we usually start with and continue to hash our newly added role.

However, the hashing algorithm state, depends not only on A,B,C and D but also on the number of bytes processed up to that point (modulo 32). At this point, this value is purely dependent on the length of the SALT which is still unknown to us but we know that there are only 32 possible values for this aspect of the state and therefore it can be bruteforced.

import socket
import base64
import itertools
from struct import pack,unpack
from math import sin
def get_cert(login_name):
#GET CERT
sock = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
sock.connect((address,port))
sock.recv(256)
sock.recv(256)
sock.send('0\n')
sock.recv(256)
sock.send(login_name+'\n')
sock.recv(256)
data = sock.recv(512).split(':')[1]
data = data.split('\r')[1]
sock.close()
cert = data
return cert
def cert_login( cert ):
#LOGIN WITH CERT
ret = ()
sock = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
sock.connect((address,port))
sock.recv(256)
sock.recv(256)
sock.send('1\n')
sock.recv(256)
sock.send(cert+'\n')
sock.recv(256)
data = sock.recv(512)
if 'Welcome' in data:
flag_pos = data.find('CTF')
flag = data[ flag_pos: flag_pos+37 ]
ret = (True,flag)
else:
ret = (False,'')
sock.close()
return ret
def gen_certs():
global KEY, s
certs = []
for i in range(0,32):
auth_str = s
salt_len = i
prev_len = len(auth_str) + salt_len
auth_str += '&role=administrator'
auth_str += hashme(mhash,'&role=administrator',prev_len)
auth_str = base64.b64encode(xor(auth_str, KEY))
certs.append(auth_str)
return certs
def xor(a, b):
return ''.join(map(lambda x : chr(ord(x[0]) ^ ord(x[1])), zip(a, b * 100)))
def hashme(mhash,s,prev_len):
#my secure hash function
def F(X,Y,Z):
return ((~X & Z) | (~X & Z)) & 0xFFFFFFFF
def G(X,Y,Z):
return ((X & Z) | (~Z & Y)) & 0xFFFFFFFF
def H(X,Y,Z):
return (X ^ Y ^ Y) & 0xFFFFFFFF
def I(X,Y,Z):
return (Y ^ (~Z | X)) & 0xFFFFFFFF
def ROL(X,Y):
return (X << Y | X >> (32 - Y)) & 0xFFFFFFFF
B = int(mhash[0:8],16)
A = int(mhash[8:16],16)
D = int(mhash[16:24],16)
C = int(mhash[24:32],16)
X = [int(0xFFFFFFFF * sin(i)) & 0xFFFFFFFF for i in xrange(256)]
for i,ch in enumerate(s):
k, l = ord(ch), (i+prev_len) & 0x1f
A = (B + ROL(A + F(B,C,D) + X[k], l)) & 0xFFFFFFFF
B = (C + ROL(B + G(C,D,A) + X[k], l)) & 0xFFFFFFFF
C = (D + ROL(C + H(D,A,B) + X[k], l)) & 0xFFFFFFFF
D = (A + ROL(D + I(A,B,C) + X[k], l)) & 0xFFFFFFFF
return ''.join(map(lambda x : hex(x)[2:].strip('L').rjust(8, '0'), [B, A, D, C]))
KEY = '28c1150dac6704583d6c1125a72d3c87241e7f5497e9b80c78f4ce2b08dcab2b0df20be0abde0b17512a935bc765607cf5e5'.decode('hex')
login_name = 'rik'
address = 'hackyou2014tasks.ctf.su'
port = 7777
#GET CERT
cert = get_cert(login_name)
cert = base64.b64decode(cert)
cert = ''.join(map( lambda (x,y): chr(ord(x)^ord(y)), zip(cert,itertools.cycle(KEY))))
mhash = cert[-32:]
s = cert[0:-32]
certs = gen_certs()
for i,cert in enumerate(certs):
print "Attempt %d: %s"%(i,cert)
result = cert_login(cert)
if result[0] == True:
print '\n\nSuccess: %s'%result[1]
break
else:
print 'Cert failed!'
view raw 200pwn.py hosted with ❤ by GitHub


Using the script above, I was able to generate the 32 candidate certificates for a particular user that comply with the SALT and KEY present in the script on the server. The 21st certificate was accepted, meaning that the length of the SALT was 20 bytes and then the flag was spit out.


1 comment:

  1. No new posts since January.. Almost a year now without an update O_o

    ReplyDelete