Hackback 2 Task 6

This challenge is from the Hackback2 CTF, on which I have been spending my spare time re-visiting some challenges. My team managed to finished 7th overall as “TheATeam”. For this walkthrough I am going to be using Ghidra, an incredibly useful reverse engineering tool which you can download from here.

Reverse Engineering

The first step once we have the executable is to run it and see what it does. In this case, it simply outputs ‘hm you need to do more to get the flag’. Not a lot of useful information.

Lets load it up in Ghidra by creating a new project then dragging the executable into the landing window, or by pressing ‘I’ and opening it using the file browser, clicking OK on the dialog to accept the default settings. You’ll then be presented with some information on the executable, as seen below. Sometimes this information can be very useful, however in this case it all seems normal.

Ghidra Information

Next, load up the executable in the code browser (by dragging it over the dragon icon) and allow it to fully analyse the file using the suggested settings. Find the Symbol Tree (usually on the left side) and use the filter options to find the ‘main’ function.

Ghidra Symbol Tree

Clicking the function will then display the decompiled code in C, which at first can seem a bit daunting. However, reading through the code and searching for information on system functions called by the executable will help to work through the problem and understand the program. The first variable is set to the return value of getuid(), which a quick search tells us that this “returns the real user id of the calling process”. Next up is getpwuid(), which “returns a pointer to a structure containing the broken-out fields of the record in the password database (e.g., the local password file /etc/passwd)”. The getenv() call returns the value of a specified environment variable, in this case, “SECRET_REQ”. It can be useful to rename these variables to make the code more readable by right-clicking them, as I have below

pw = getpwuid(__uid);
envvar = getenv("SECRET_REQ");
ret = thunk_FUN_004004ee(&DAT_0049e824,pw->pw_name)

The program then goes on to call a function which Ghidra does not recognise, however, if we look at later lines we can see that this function is comparing the ‘envvar’ variable, as renamed above, to the string “coolenvvar”. Using this, we can guess that this function is likely the same or similar to the strcmp() function. We can make the code far more readable by redefining the function using the “Edit Function Signature” in the right-click menu and using the prototype of the strcmp() function.

int strcmp (char* str1, char* str2)

Doing this makes the code far more readable, and we can now see that firstly, the program checks if the username is “800”, then checks if the environment variable “SECRET_REQ” is equal to “coolenvvar”. If both these checks pass, it attempts to access the file “secrets.zip”. If it cannot find the file, it calls another function.

pw = getpwuid(__uid);
envvar = getenv("SECRET_REQ");
ret = strcmp("800",pw->pw_name);
if (ret == 0) {
    if (envvar != (char *)0x0) {
    ret = strcmp(envvar,"coolenvvar");
        if (ret == 0) {
            ret = access("secrets.zip",0);
            if (ret != -1) {
                asvv889a();
            }
        }
    }
}
else {
    printf("hm you need to do more to get the flag");
}

Lets investigate the function “asvv889a()” by double clicking on it. Here we can see a printf() statement to print the flag, as well as a couple of variables.

Ghidra Flag

We can see that uVar1 is set to the return value of “local18” when passed through the strtol() command, which converts the initial part of a string to a long variable type. This means that “local18” must be a string, and a brief look at the value and you can probably guess that it is in hexidecimal format. We can format this into text using CyberChef using the “From Hex” operation and then reversing the string. After that, we have our flag!

Thanks for reading! If you enjoyed this article, follow me on Twitter to stay updated on other content I post or check out my GitHub for my other projects.