From c99a49001cecf6cd5b29cd874ea2d10049bcdfe9 Mon Sep 17 00:00:00 2001 From: Raul Perdomo Date: Tue, 31 Oct 2023 04:45:08 +0000 Subject: [PATCH 1/3] =?UTF-8?q?Se=C3=B1or=20Pentester=20submission?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- "2023/elf/Se\303\261orPentester.elf64.txt" | 27 ++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 "2023/elf/Se\303\261orPentester.elf64.txt" diff --git "a/2023/elf/Se\303\261orPentester.elf64.txt" "b/2023/elf/Se\303\261orPentester.elf64.txt" new file mode 100644 index 0000000..df1c609 --- /dev/null +++ "b/2023/elf/Se\303\261orPentester.elf64.txt" @@ -0,0 +1,27 @@ +---BEGIN BGGP4--- +Submit Date: 10/31/2023 +BGGP Challenge Number: 4 +Author: Señor Pentester +Contact Info (Optional): raul@perdomo.org +Online Presence (Website/Social Media): +Target File Type: ELF 64-bit LSB executable, ARM aarch64 +File Size: 576 +SHA256 Hash: c9324adc16f7146ee6ce1676c27015e6f92b0e14 +Target Environment (How do we run the file?): On a Raspberry Pi or other Aarch64 system just run: ./bggp4 +Any additional info?: I'm not very good at stripping ELFs yet, but wanted to give it a try anyway. +Link to PoC video, screenshot, or console output, if any: +Link to writeup, if any: +File contents (base64 encoded please): +f0VMRgIBAQAAAAAAAAAAAAIAtwABAAAAsABAAAAAAABAAAAAAAAAAEABAAAAAAAAAAAAAEAAOAAC +AEAABAADAAEAAAAFAAAAAAAAAAAAAAAAAEAAAAAAAAAAQAAAAAAAGAEAAAAAAAAYAQAAAAAAAAAA +AQAAAAAAAQAAAAYAAAAYAQAAAAAAABgBQQAAAAAAGAFBAAAAAAARAAAAAAAAABEAAAAAAAAAAAAB +AAAAAABgDICSoQIAWEIIgNLDNoDSCAeA0gEAANTqAwCqYAyAkgECAFgCAIDSCAeA0gEAANQBAIDS +4gMKqgMAgNIESIDSBQCA0qgjgNIBAADUgACA0qgLgNIBAADUGAFBAAAAAAAaAUEAAAAAADQAL3By +b2Mvc2VsZi9leGUAAC5zaHN0cnRhYgAudGV4dAAuZGF0YQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA +AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwAAAAEAAAAGAAAAAAAA +ALAAQAAAAAAAsAAAAAAAAABoAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAABEAAAABAAAA +AwAAAAAAAAAYAUEAAAAAABgBAAAAAAAAEQAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAB +AAAAAwAAAAAAAAAAAAAAAAAAAAAAAAApAQAAAAAAABcAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAAA +AAAAAAAA +---END BGGP4--- + From 18925ed5d0766843ed3749c70864bec6930026bc Mon Sep 17 00:00:00 2001 From: Raul Perdomo Date: Tue, 31 Oct 2023 05:02:44 +0000 Subject: [PATCH 2/3] Added link to proof png --- "2023/elf/Se\303\261orPentester.elf64.txt" | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git "a/2023/elf/Se\303\261orPentester.elf64.txt" "b/2023/elf/Se\303\261orPentester.elf64.txt" index df1c609..f1af470 100644 --- "a/2023/elf/Se\303\261orPentester.elf64.txt" +++ "b/2023/elf/Se\303\261orPentester.elf64.txt" @@ -9,7 +9,7 @@ File Size: 576 SHA256 Hash: c9324adc16f7146ee6ce1676c27015e6f92b0e14 Target Environment (How do we run the file?): On a Raspberry Pi or other Aarch64 system just run: ./bggp4 Any additional info?: I'm not very good at stripping ELFs yet, but wanted to give it a try anyway. -Link to PoC video, screenshot, or console output, if any: +Link to PoC video, screenshot, or console output, if any: https://github.com/raulperdomo/BGGP4_Dev/blob/master/bggp4.png?raw=true Link to writeup, if any: File contents (base64 encoded please): f0VMRgIBAQAAAAAAAAAAAAIAtwABAAAAsABAAAAAAABAAAAAAAAAAEABAAAAAAAAAAAAAEAAOAAC From 87a42e1038a22468574daae0d6ef8231b793b6fc Mon Sep 17 00:00:00 2001 From: Raul Perdomo Date: Tue, 31 Oct 2023 10:16:12 +0000 Subject: [PATCH 3/3] greatly reduced size --- "2023/elf/Se\303\261orPentester.elf64.txt" | 20 +++++++------------- 1 file changed, 7 insertions(+), 13 deletions(-) diff --git "a/2023/elf/Se\303\261orPentester.elf64.txt" "b/2023/elf/Se\303\261orPentester.elf64.txt" index f1af470..5724ff5 100644 --- "a/2023/elf/Se\303\261orPentester.elf64.txt" +++ "b/2023/elf/Se\303\261orPentester.elf64.txt" @@ -5,23 +5,17 @@ Author: Señor Pentester Contact Info (Optional): raul@perdomo.org Online Presence (Website/Social Media): Target File Type: ELF 64-bit LSB executable, ARM aarch64 -File Size: 576 -SHA256 Hash: c9324adc16f7146ee6ce1676c27015e6f92b0e14 +File Size: 243 +SHA256 Hash: a397c3c5376b5d689b2a1084b7356109e9059b95 Target Environment (How do we run the file?): On a Raspberry Pi or other Aarch64 system just run: ./bggp4 Any additional info?: I'm not very good at stripping ELFs yet, but wanted to give it a try anyway. Link to PoC video, screenshot, or console output, if any: https://github.com/raulperdomo/BGGP4_Dev/blob/master/bggp4.png?raw=true Link to writeup, if any: File contents (base64 encoded please): -f0VMRgIBAQAAAAAAAAAAAAIAtwABAAAAsABAAAAAAABAAAAAAAAAAEABAAAAAAAAAAAAAEAAOAAC -AEAABAADAAEAAAAFAAAAAAAAAAAAAAAAAEAAAAAAAAAAQAAAAAAAGAEAAAAAAAAYAQAAAAAAAAAA -AQAAAAAAAQAAAAYAAAAYAQAAAAAAABgBQQAAAAAAGAFBAAAAAAARAAAAAAAAABEAAAAAAAAAAAAB -AAAAAABgDICSoQIAWEIIgNLDNoDSCAeA0gEAANTqAwCqYAyAkgECAFgCAIDSCAeA0gEAANQBAIDS -4gMKqgMAgNIESIDSBQCA0qgjgNIBAADUgACA0qgLgNIBAADUGAFBAAAAAAAaAUEAAAAAADQAL3By -b2Mvc2VsZi9leGUAAC5zaHN0cnRhYgAudGV4dAAuZGF0YQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA -AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwAAAAEAAAAGAAAAAAAA -ALAAQAAAAAAAsAAAAAAAAABoAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAABEAAAABAAAA -AwAAAAAAAAAYAUEAAAAAABgBAAAAAAAAEQAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAB -AAAAAwAAAAAAAAAAAAAAAAAAAAAAAAApAQAAAAAAABcAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAAA -AAAAAAAA +f0VMRgIBAQAAAAAAAAAAAAIAtwABAAAAeABAAAAAAABAAAAAAAAAABABAAAAAAAAAAAAAEAAOAAB +AEAAAwACAAEAAAAFAAAAAAAAAAAAAAAAAEAAAAAAAAAAQAAAAAAA+AAAAAAAAAD4AAAAAAAAAAAA +AQAAAAAAYAyAkmEDAFhCCIDSwzaA0ggHgNIBAADU6gMAqmAMgJLBAgBYAgCA0ggHgNIBAADUAQCA +0uIDCqoDAIDSZB6A0gUAgNKoI4DSAQAA1IAAgNKoC4DSAQAA1DQAL3Byb2Mvc2VsZi9leGUAAAAA +AAAAANAAQAAAAAAA0gBA ---END BGGP4---