The remote service ask for a name, if you send more than 64 bytes, a memory leak happens.
The buffer next to the name's is the first random value used to init the srand()
If we get this value, and set our local srand([leaked] ^ [luckyNumber]) we will be able to predict the following randoms and win the game, but we have to see few details more ;)
The function used to read the input until the byte \n appears, but also up to 64 bytes, if we trigger this second condition there is not 0x00 and the print shows the random buffer :)
The nickname buffer:

The seed buffer:

So here it is clear, but let's see that the random values are computed with several gpu instructions which are decompiled incorrectly:


We tried to predict the random and aply the gpu divisions without luck :(

There was a missing detail in this predcitor, but there are always other creative ways to do the things.
We use the local software as a predictor, we inject the leaked seed on the local binary of the remote server and got a perfect syncronization, predicting the remote random values:

The process is a bit ugly becouse we combined automated process of leak exctraction and socket interactive mode, with the manual gdb macro.
The macro:
Continue reading
- Pentest Tools Alternative
- Pentest Tools Url Fuzzer
- Hack Tools Mac
- Hacking Tools Online
- Blackhat Hacker Tools
- Pentest Tools Review
- Pentest Tools Port Scanner
- Hack Tools Mac
- Pentest Tools Alternative
- Pentest Tools Linux
- Free Pentest Tools For Windows
- Hacking Tools Windows
- Game Hacking
- Blackhat Hacker Tools
- Best Hacking Tools 2019
- Pentest Tools For Windows
- Hacker Tools Mac
- Hacking Tools Kit
- Hacker Tools List
- Hacking Tools 2019
- Kik Hack Tools
- Hack Tools 2019
- Hacker Tools
- Underground Hacker Sites
- Pentest Tools Review
- Pentest Tools Windows
- Hackrf Tools
- Hacking Tools Name
- Pentest Tools Free
- Hacker Tools Free
- Hacking Tools Name
- Pentest Tools For Windows
- Hack Tools Download
- Hacking Tools Windows 10
- Hacking Tools Windows
- Pentest Reporting Tools
- Pentest Tools Github
- Hacker Tools Free Download
- Pentest Tools Windows
- Hacker Tools Free Download
- Hacking App
- Tools For Hacker
- Hack Tools For Ubuntu
- Pentest Tools Website Vulnerability
- How To Hack
- Hacker Tools
- Hack Tools
- Hacking Tools
- Pentest Tools Nmap
- New Hack Tools
- Pentest Automation Tools
- Hacker Tools
No hay comentarios:
Publicar un comentario