As I announced via Twitter, here’s a new puzzle. Find the message I’ve hidden in this picture.
First one to post a comment with the correct answer can get a sticker. For those who don’t know, comments are moderated.
The message is: “Hello from BMP shellcode!”
Comment by Ostracon — Sunday 9 November 2008 @ 22:25
Correct! Static or dynamic analysis?
Comment by Didier Stevens — Sunday 9 November 2008 @ 22:30
Too late for a prize, I know, but my static method to find the answer without doing a whole lot of disassembly work:
Look through file, observe some shellcode sequences, dump the whole thing straight into ndisasm:
ndisasm -u picture-puzzle.bmp
Notice all the bytes being directly written to a local, so grep out the interesting bytes:
dd if=picture-puzzle.bmp bs=1 2>/dev/null|ndisasm -u -|grep ‘mov byte’|sed ‘s/[^,]*,0/\\/g’|tr -d ‘\n’
Run through printf after changing null bytes to newlines:
Uryyb sebz OZC furyypbqr!
Looks like alphabetic substitution on the interesting string, notice no obvious operations in the shellcode to deobfuscate it, take a wild shot on rot13, get lucky, and done.
Comment by Jordan — Monday 10 November 2008 @ 12:57
Nice command-line skills Jordan!
Comment by Didier Stevens — Monday 10 November 2008 @ 13:10
Thanks! “If it can’t be done on the command-line, it isn’t worth doing” is my motto… or something like that. ;-)
FYI if anybody tries to copy/paste: the smart quotes from WordPress will likely get in the way.
Also, my method is certainly not the recommended way to actually learn from the challenge. Dump into a shellcode wrapper or debugger for maximum enjoyment.
Comment by Jordan — Monday 10 November 2008 @ 22:30
Complete neophyte here – arrived by way of another blog.
I’m very interested in learning about these analyses that you describe in your various posts.
Are there useful tools (such as the shellcode wrapper or debugger that Jordan mentions) available as freeware for Windows?
Comment by sh4Rkb8 — Thursday 13 November 2008 @ 14:58
I was able to find the string Jordan was referring to by opening the file in a hex editor, did a hex-ascii conversion, and applying rot13 (like Jordan) arrived at the answer.
However, that was clearly the easy part. I’m still trying to figure out how to trim it down to that particular string from the whole hex dump. Mind you, I don’t have nearly the skills Jordan clearly does.
Comment by sh4Rkb8 — Thursday 13 November 2008 @ 20:20
… and the ascii table was superfluous (should have looked more closely at the text table in the hex editor).
I’ll shut up now.
Comment by sh4Rkb8 — Thursday 13 November 2008 @ 20:43
I’ll post my solution for Windows in the coming weeks
Comment by Didier Stevens — Thursday 13 November 2008 @ 20:48
That commandline can be sharpened up a touch … I tend to build up a commandline one step at a time, makes it easy to see what’s going on.
Once you get a good command-line solution, this can usefully form the basis of automated testing :-)
As Jordan says, the key here is to run ndisasm over the file, and notice the ‘mov byte’ invocations. Collecting them with grep is simple, and then cut can be used to grab just the bytes themselves out.
ndisasm -u picture-puzzle.bmp | grep ‘mov byte’ | cut -d, -f2
This produces the bytes we want, one per line. To make printf’s job easier, we need to replace ‘^0x’ with ‘\x…’ (using single quotes here to make the \ safe from the shell, but still doubling it because of sed), and also replace ‘x0$’ (the null) with ‘x0a’ (LF)
… | sed -e ‘s/^0x/\\x/; s/x0$/x0a/’
The tr command is a great way to strip out all the newlines, and make this one single line for the printf command … which wraps around the whole commandline using the $() operator from bash (easier to read than the traditional shell ` backticks)
printf $(ndisadm …|tr -d ‘\n’)
Oh noes! An alphabet substitution … quickly fixed with the caesar program, which will do a quick letter frequency count to determine the correct rotation to use … in this case, it’s 13 of course.
printf $(ndisasm -u picture-puzzle.bmp | grep ‘mov byte’ | cut -d, -f2 |
sed -e ‘s/^0x/\\x/; s/x0$/x0a/’ | tr -d ‘\n’ ) | caesar
Hello from BMP shellcode!
Comment by Jim — Thursday 13 November 2008 @ 21:10
RSS feed for comments on this post. TrackBack URI
Fill in your details below or click an icon to log in:
You are commenting using your WordPress.com account. ( Log Out / Change )
You are commenting using your Twitter account. ( Log Out / Change )
You are commenting using your Facebook account. ( Log Out / Change )
You are commenting using your Google+ account. ( Log Out / Change )
Connecting to %s
Notify me of new comments via email.
Notify me of new posts via email.
The Rubric Theme. Blog at WordPress.com.
Get every new post delivered to your Inbox.
Join 325 other followers