The remote service ask for a name, if you send more than 64 bytes, a memory leak happens.
The buffer next to the name's is the first random value used to init the srand()
If we get this value, and set our local srand([leaked] ^ [luckyNumber]) we will be able to predict the following randoms and win the game, but we have to see few details more ;)
The function used to read the input until the byte \n appears, but also up to 64 bytes, if we trigger this second condition there is not 0x00 and the print shows the random buffer :)
The nickname buffer:

The seed buffer:

So here it is clear, but let's see that the random values are computed with several gpu instructions which are decompiled incorrectly:


We tried to predict the random and aply the gpu divisions without luck :(

There was a missing detail in this predcitor, but there are always other creative ways to do the things.
We use the local software as a predictor, we inject the leaked seed on the local binary of the remote server and got a perfect syncronization, predicting the remote random values:

The process is a bit ugly becouse we combined automated process of leak exctraction and socket interactive mode, with the manual gdb macro.
The macro:
Related news
- Hacking Tools For Games
- Hacker Techniques Tools And Incident Handling
- Hacker Tools Free Download
- Pentest Tools Nmap
- Hack And Tools
- Tools Used For Hacking
- Pentest Tools Tcp Port Scanner
- Pentest Automation Tools
- Pentest Tools Github
- Hack Tools For Mac
- Black Hat Hacker Tools
- Hacker Tools 2019
- Pentest Tools Website Vulnerability
- Pentest Automation Tools
- Pentest Tools For Mac
- Hack Tools For Ubuntu
- Pentest Tools For Windows
- Hacking Tools And Software
- Pentest Tools Bluekeep
- Hacking Tools Mac
- Hack Tools For Pc
- Hacker Tools Linux
- Hacker Tools
- Pentest Tools
- Hacking Tools Free Download
- Hacker Hardware Tools
- Pentest Tools Subdomain
- Usb Pentest Tools
- Hack Tools Github
- Ethical Hacker Tools
- Pentest Tools Open Source
- Bluetooth Hacking Tools Kali
- Hacker Tools Free Download
- Hack Tools Github
- Hack Tools
- Hacker Tools Windows
- Pentest Tools Subdomain
- Pentest Tools Tcp Port Scanner
- Pentest Tools For Android
- Hacking Tools Free Download
- Usb Pentest Tools
- Hak5 Tools
- Pentest Tools Nmap
- Ethical Hacker Tools
- Pentest Reporting Tools
- Hack Tools For Pc
- What Is Hacking Tools
- Hacker Tools
- Hacker Tools Windows
- Hacker Hardware Tools
- Pentest Tools For Windows
- New Hacker Tools
- Android Hack Tools Github
- Wifi Hacker Tools For Windows




No hay comentarios:
Publicar un comentario