19 gen 2024

NcN 2015 CTF - theAnswer Writeup


1. Overview

Is an elf32 static and stripped binary, but the good news is that it was compiled with gcc and it will not have shitty runtimes and libs to fingerprint, just the libc ... and libprhrhead
This binary is writed by Ricardo J Rodrigez

When it's executed, it seems that is computing the flag:


But this process never ends .... let's see what strace say:


There is a thread deadlock, maybe the start point can be looking in IDA the xrefs of 0x403a85
Maybe we can think about an encrypted flag that is not decrypting because of the lock.

This can be solved in two ways:

  • static: understanding the cryptosystem and programming our own decryptor
  • dynamic: fixing the the binary and running it (hard: antidebug, futex, rands ...)


At first sight I thought that dynamic approach were quicker, but it turned more complex than the static approach.


2. Static approach

Crawling the xrefs to the futex, it is possible to locate the main:



With libc/libpthread function fingerprinting or a bit of manual work, we have the symbols, here is the main, where 255 threads are created and joined, when the threads end, the xor key is calculated and it calls the print_flag:



The code of the thread is passed to the libc_pthread_create, IDA recognize this area as data but can be selected as code and function.

This is the thread code decompiled, where we can observe two infinite loops for ptrace detection and preload (although is static) this antidebug/antihook are easy to detect at this point.


we have to observe the important thing, is the key random?? well, with the same seed the random sequence will be the same, then the key is "hidden" in the predictability of the random.

If the threads are not executed on the creation order, the key will be wrong because is xored with the th_id which is the identify of current thread.

The print_key function, do the xor between the key and the flag_cyphertext byte by byte.


And here we have the seed and the first bytes of the cypher-text:



With radare we can convert this to a c variable quickly:


And here is the flag cyphertext:


And with some radare magics, we have the c initialized array:


radare, is full featured :)

With a bit of rand() calibration here is the solution ...



The code:
https://github.com/NocONName/CTF_NcN2k15/blob/master/theAnswer/solution.c





3. The Dynamic Approach

First we have to patch the anti-debugs, on beginning of the thread there is two evident anti-debugs (well anti preload hook and anti ptrace debugging) the infinite loop also makes the anti-debug more evident:



There are also a third anti-debug, a bit more silent, if detects a debugger trough the first available descriptor, and here comes the fucking part, don't crash the execution, the execution continues but the seed is modified a bit, then the decryption key will not be ok.





Ok, the seed is incremented by one, this could be a normal program feature, but this is only triggered if the fileno(open("/","r")) > 3 this is a well known anti-debug, that also can be seen from a traced execution.

Ok, just one byte patch,  seed+=1  to  seed+=0,   (add eax, 1   to add eax, 0)

before:


after:



To patch the two infinite loops, just nop the two bytes of each jmp $-0



Ok, but repairing this binary is harder than building a decryptor, we need to fix more things:

  •  The sleep(randInt(1,3)) of the beginning of the thread to execute the threads in the correct order
  •  Modify the pthread_cond_wait to avoid the futex()
  • We also need to calibrate de rand() to get the key (just patch the sleep and add other rand() before the pthread_create loop
Adding the extra rand() can be done with a patch because from gdb is not possible to make a call rand() in this binary.

With this modifications, the binary will print the key by itself. 

More info


  1. Hacker Tools Hardware
  2. Pentest Tools Github
  3. Hacking Tools For Pc
  4. Pentest Tools Review
  5. Top Pentest Tools
  6. Hacker Tools
  7. Pentest Tools Url Fuzzer
  8. Hack Tools For Mac
  9. Hacking Tools For Mac
  10. Pentest Tools Framework
  11. Hacking Tools For Pc
  12. Pentest Tools Alternative
  13. Game Hacking
  14. Hack Tools Github
  15. Hacker Tools Github
  16. Pentest Tools Free
  17. How To Make Hacking Tools
  18. Hacking Tools Online
  19. Hacking Tools 2019
  20. Hack Tool Apk
  21. Hacking Tools For Windows 7
  22. Install Pentest Tools Ubuntu
  23. Nsa Hacker Tools
  24. Pentest Tools Kali Linux
  25. Pentest Tools Find Subdomains
  26. Github Hacking Tools
  27. Hacking Tools For Windows Free Download
  28. Hacker Tools Online
  29. Hacker Tools Free
  30. Hacking Tools For Windows 7
  31. Usb Pentest Tools
  32. New Hack Tools
  33. Github Hacking Tools
  34. Hacker Tools Github
  35. Pentest Reporting Tools
  36. Nsa Hacker Tools
  37. Pentest Box Tools Download
  38. Hacking Tools Github
  39. Hacking Tools For Windows Free Download
  40. Hacker Tools Github
  41. Hacker Tools List
  42. Hacker Tools Apk Download
  43. Hack Tools For Ubuntu
  44. Hack Tools For Mac
  45. Kik Hack Tools
  46. Pentest Tools
  47. Underground Hacker Sites
  48. Pentest Tools Url Fuzzer
  49. Hack Tools Online
  50. Hacking Tools For Windows Free Download
  51. Hacker Hardware Tools
  52. Beginner Hacker Tools
  53. Hack Apps
  54. Pentest Tools Subdomain
  55. Computer Hacker
  56. Termux Hacking Tools 2019
  57. Hacker Tool Kit
  58. Hack Tools Pc
  59. Pentest Tools
  60. Install Pentest Tools Ubuntu
  61. New Hacker Tools
  62. Hacker Tools Apk Download
  63. Hacker Tools For Mac
  64. Hacker Tools For Mac
  65. Hacking Tools For Kali Linux
  66. Pentest Reporting Tools
  67. Hacker Tools Linux
  68. Hack Tools
  69. Hack Tools Mac
  70. Hacking Tools For Pc
  71. Hacker Tools Software
  72. Hacking Apps
  73. Tools 4 Hack
  74. Hack Tools For Windows
  75. Kik Hack Tools
  76. Hacking Tools 2020
  77. How To Hack

"I Am Lady" Linux.Lady Trojan Samples



Bitcoin mining malware for Linux servers - samples
Research: Dr. Web. Linux.Lady

Sample Credit:  Tim Strazzere

MD5 list:

0DE8BCA756744F7F2BDB732E3267C3F4
55952F4F41A184503C467141B6171BA7
86AC68E5B09D1C4B157193BB6CB34007
E2CACA9626ED93C3D137FDF494FDAE7C
E9423E072AD5A31A80A31FC1F525D614



Download. Email me if you need the password.
More information
  1. Hacks And Tools
  2. Kik Hack Tools
  3. Hacking Tools Kit
  4. Hacker Tools Apk
  5. Hacker Tools Github
  6. Pentest Tools Windows
  7. Android Hack Tools Github
  8. Pentest Tools Apk
  9. Hacker
  10. Pentest Tools Find Subdomains
  11. Hack Tools 2019
  12. Pentest Tools Find Subdomains
  13. Nsa Hacker Tools
  14. Kik Hack Tools
  15. Hacker Tool Kit
  16. Easy Hack Tools
  17. Beginner Hacker Tools
  18. Hack And Tools
  19. Hackrf Tools
  20. Hack Tools For Windows
  21. Hacking Tools For Mac
  22. Physical Pentest Tools
  23. Hacking Tools For Kali Linux
  24. Top Pentest Tools
  25. Hacking Tools Github
  26. Wifi Hacker Tools For Windows
  27. Pentest Automation Tools
  28. What Is Hacking Tools
  29. Pentest Tools
  30. Termux Hacking Tools 2019
  31. Nsa Hack Tools Download
  32. Hacker Tools Hardware
  33. Hacker Tools Free
  34. Pentest Tools Android
  35. Pentest Tools List
  36. How To Install Pentest Tools In Ubuntu
  37. Pentest Tools Review
  38. Hacker Tools Software
  39. Pentest Tools Url Fuzzer
  40. Black Hat Hacker Tools
  41. Beginner Hacker Tools
  42. How To Install Pentest Tools In Ubuntu
  43. How To Hack
  44. Pentest Tools Android
  45. Hackrf Tools
  46. Hacker Tools Windows
  47. Pentest Recon Tools
  48. Hack Tools For Windows
  49. Hacker Tools List
  50. Beginner Hacker Tools
  51. Hack Tool Apk
  52. Nsa Hack Tools
  53. Hacker Search Tools
  54. Hack Tools For Mac
  55. Pentest Tools
  56. Best Pentesting Tools 2018
  57. Hacking Tools Usb
  58. What Are Hacking Tools
  59. Tools For Hacker
  60. Best Pentesting Tools 2018
  61. Termux Hacking Tools 2019
  62. Pentest Tools Windows
  63. Hacker Tools List
  64. Hacker Tools Free Download
  65. Hack Tools Github
  66. Tools For Hacker
  67. Github Hacking Tools
  68. Hacker Tools List
  69. Best Pentesting Tools 2018
  70. Best Hacking Tools 2019
  71. Kik Hack Tools
  72. Nsa Hack Tools
  73. New Hacker Tools
  74. Hack Tools For Games
  75. Hack Tools For Games
  76. Pentest Tools Bluekeep
  77. Pentest Reporting Tools
  78. Hack Tools For Windows
  79. Top Pentest Tools
  80. Hacker Tools List
  81. Hacker Tools Windows
  82. Hack Tools For Windows
  83. Hack Website Online Tool
  84. Pentest Tools Website
  85. Hacker Tools Linux
  86. Tools For Hacker
  87. Hacker Tools Free
  88. Hacker Tools List
  89. Wifi Hacker Tools For Windows
  90. Hacking Tools Hardware
  91. Beginner Hacker Tools
  92. Pentest Tools Apk
  93. Kik Hack Tools
  94. Best Pentesting Tools 2018
  95. Easy Hack Tools
  96. Bluetooth Hacking Tools Kali
  97. Nsa Hacker Tools
  98. Hacker Tools For Pc
  99. How To Install Pentest Tools In Ubuntu
  100. Nsa Hacker Tools
  101. Best Hacking Tools 2020
  102. Best Hacking Tools 2020
  103. Hackrf Tools
  104. Best Hacking Tools 2019
  105. Hack Tools For Windows
  106. New Hack Tools
  107. Hak5 Tools
  108. Top Pentest Tools
  109. Hacking Tools Software
  110. Hacking Tools For Windows
  111. Hacker Tool Kit
  112. Beginner Hacker Tools
  113. Hack Tools Online
  114. Hacker Security Tools
  115. Hack And Tools
  116. New Hack Tools
  117. Pentest Tools Apk
  118. Hacker Tools Github
  119. Hacker Tools Apk
  120. New Hack Tools
  121. Ethical Hacker Tools
  122. Hack Tools For Pc
  123. Hacker Tools For Windows
  124. Hack Tools For Ubuntu
  125. Pentest Tools Linux
  126. Hacker Tools 2020
  127. World No 1 Hacker Software
  128. Hack Tools For Windows
  129. Hack Tools
  130. Hacker
  131. Hacking Tools For Kali Linux
  132. Hacking Tools For Beginners
  133. Hacking Tools Download
  134. Hack Tools For Mac
  135. Hacking Tools For Windows Free Download
  136. Pentest Tools Android
  137. Hacker Tools 2020
  138. Hacking Tools For Windows
  139. Hacking Tools Name
  140. Hacker Tools 2020
  141. Hacker Tools Mac
  142. Hack Tool Apk
  143. Hacker Tools 2020
  144. Pentest Tools Linux
  145. Hacking Tools Kit
  146. Top Pentest Tools
  147. Hacker Search Tools
  148. Hacking Tools For Mac
  149. Pentest Tools Find Subdomains

CEH: Identifying Services & Scanning Ports | Gathering Network And Host Information | NMAP


CEH scanning methodology is the important step i.e. scanning for open ports over a network. Port is the technique used to scan for open ports. This methodology performed for the observation of the open and close ports running on the targeted machine. Port scanning gathered a valuable information about  the host and the weakness of the system more than ping sweep.

Network Mapping (NMAP)

Basically NMAP stands for Network Mapping. A free open source tool used for scanning ports, service detection, operating system detection and IP address detection of the targeted machine. Moreover, it performs a quick and efficient scanning a large number of machines in a single session to gathered information about ports and system connected to the network. It can be used over UNIX, LINUX and Windows.

There are some terminologies which we should understand directly whenever we heard like Open ports, Filtered ports and Unfiltered ports.

Open Ports means the target machine accepts incoming request on that port cause these ports are used to accept packets due to the configuration of TCP and UDP.

Filtered ports means the ports are usually opened but due to firewall or network filtering the nmap doesn't detect the open ports.

Unfiltered means the nmap is unable to determine whether the port is open or filtered  while the port is accessible.

Types Of NMAP Scan


Scan Type Description
Null Scan This scan is performed by both an ethical hackers and black hat hackers. This scan is used to identify the TCP port whether it is open or closed. Moreover, it only works over UNIX  based systems.
TCP connect The attacker makes a full TCP connection to the target system. There's an opportunity to connect the specifically port which you want to connect with. SYN/ACK signal observed for open ports while RST/ACK signal observed for closed ports.
ACK scan Discovering the state of firewall with the help ACK scan whether it is stateful or stateless. This scan is typically used for the detection of filtered ports if ports are filtered. Moreover, it only works over the UNIX based systems.
Windows scan This type of scan is similar to the ACK scan but there is ability to detect an open ports as well filtered ports.
SYN stealth scan This malicious attack is mostly performed by attacker to detect the communication ports without making full connection to the network.
This is also known as half-open scanning. 

 

All NMAP Commands 


Commands Scan Performed
-sT TCP connect scan
-sS SYN scan
-sF FIN scan
-sX XMAS tree scan
-sN Null scan
-sP Ping scan
-sU UDP scan
-sO Protocol scan
-sA ACK scan
-sW Window scan
-sR RPC scan
-sL List/DNS scan
-sI Idle scan
-Po Don't ping
-PT TCP ping
-PS SYN ping
-PI ICMP ping
-PB ICMP and TCP ping
-PB ICMP timestamp
-PM ICMP netmask
-oN Normal output
-oX XML output
-oG Greppable output
-oA All output
-T Paranoid Serial scan; 300 sec between scans
-T Sneaky Serial scan; 15 sec between scans
-T Polite Serial scan; .4 sec between scans
-T Normal Parallel scan
-T Aggressive Parallel scan, 300 sec timeout, and 1.25 sec/probe
-T Insane Parallel scan, 75 sec timeout, and .3 sec/probe

 

How to Scan

You can perform nmap scanning over the windows command prompt followed by the syntax below. For example, If you wanna scan the host with the IP address 192.168.2.1 using a TCP connect scan type, enter this command:

nmap 192.168.2.1 –sT

nmap -sT 192.168.2.1

More information
  1. Hacking Tools 2020
  2. Hackrf Tools
  3. Hack Tools For Games
  4. Hack Rom Tools
  5. Hacker Tools Windows
  6. Ethical Hacker Tools
  7. Hacking Tools Free Download
  8. Hacker Tools Free
  9. Pentest Tools Bluekeep
  10. Hack Tools
  11. Hack Tool Apk No Root
  12. Hacker Tools For Pc
  13. Tools For Hacker
  14. Hacking Tools Usb
  15. Nsa Hack Tools Download
  16. Pentest Tools Port Scanner
  17. Hacker Tool Kit
  18. Easy Hack Tools
  19. Hacker Tools For Pc
  20. Pentest Tools Open Source
  21. Hack Tools 2019
  22. Pentest Tools Windows
  23. Hacking Tools Mac
  24. Pentest Tools Kali Linux
  25. Hacking Tools And Software
  26. Hack Tools Pc
  27. Computer Hacker
  28. Blackhat Hacker Tools
  29. Hacker Tools Free Download
  30. Pentest Tools Free
  31. Hacker Tool Kit
  32. Pentest Tools For Ubuntu
  33. Hack Tools Mac
  34. Hack Tools For Ubuntu
  35. Pentest Tools For Ubuntu
  36. Pentest Tools Open Source
  37. Tools For Hacker
  38. Usb Pentest Tools
  39. Pentest Tools Url Fuzzer
  40. Underground Hacker Sites
  41. Hack Tools Github
  42. Hackrf Tools
  43. Hacking Tools For Games
  44. Pentest Tools Framework
  45. World No 1 Hacker Software
  46. Hacking Tools For Windows
  47. Tools 4 Hack
  48. Pentest Tools For Ubuntu
  49. Hack Tools
  50. Hack Tools 2019
  51. Hacker Tools For Pc
  52. Usb Pentest Tools
  53. Hack Tools
  54. Hack Tool Apk No Root
  55. Hacking Tools For Windows 7
  56. Hacking Tools Name
  57. Hacks And Tools
  58. Best Hacking Tools 2019
  59. Hacker Tools Free Download
  60. Hacking Tools For Mac
  61. Hack Tools Pc
  62. Android Hack Tools Github
  63. Usb Pentest Tools
  64. Hacking Tools For Kali Linux
  65. Pentest Tools Open Source
  66. Hackers Toolbox
  67. Pentest Tools For Windows
  68. Pentest Tools Android
  69. Pentest Tools Github
  70. Usb Pentest Tools
  71. Hacking Tools 2019
  72. Hacking Tools For Mac
  73. Hacking Apps
  74. Pentest Tools Android
  75. Hack App
  76. Hacking Tools For Games
  77. Pentest Tools Bluekeep
  78. Bluetooth Hacking Tools Kali
  79. Install Pentest Tools Ubuntu
  80. Hacker Tools Online
  81. Nsa Hack Tools Download
  82. Hacker Security Tools
  83. Hack Tool Apk
  84. Hacker Tools For Pc
  85. Hacker Tools Apk
  86. Hacker Tools
  87. Ethical Hacker Tools
  88. Hacker Tools Free
  89. Hacker Tool Kit
  90. Usb Pentest Tools
  91. Beginner Hacker Tools
  92. Best Hacking Tools 2019
  93. Hacker Techniques Tools And Incident Handling
  94. Hacking Tools Hardware
  95. Pentest Tools Windows
  96. Pentest Tools Github
  97. Hack App
  98. Beginner Hacker Tools
  99. Hack Tools
  100. Hacking Tools Name
  101. Hack Tools
  102. Hack Tools 2019
  103. Hack Tools
  104. Hacking Tools For Mac
  105. Hack Tools For Windows
  106. Hacker Tools For Mac
  107. Hacking Tools Pc
  108. Usb Pentest Tools
  109. Termux Hacking Tools 2019
  110. Hacking Tools For Mac
  111. Pentest Tools Tcp Port Scanner
  112. Hacker Tools Apk
  113. Hacking Tools For Pc
  114. Hacker Tools 2019
  115. Hackers Toolbox
  116. Best Hacking Tools 2020
  117. Hacker Tools Apk Download
  118. Pentest Tools Kali Linux
  119. Hak5 Tools
  120. Hack Tools Download
  121. Hacker Tool Kit
  122. Pentest Box Tools Download
  123. Blackhat Hacker Tools
  124. Pentest Tools For Mac
  125. Best Hacking Tools 2020
  126. Android Hack Tools Github
  127. Hacker Tools
  128. Hacking Tools Windows
  129. Hacker Tools For Ios
  130. Hacker Tools For Ios
  131. Hack Rom Tools
  132. Hacking Apps
  133. Best Hacking Tools 2019
  134. Black Hat Hacker Tools
  135. Termux Hacking Tools 2019