• Stars
    star
    147
  • Rank 243,521 (Top 5 %)
  • Language
    Python
  • License
    MIT License
  • Created over 6 years ago
  • Updated over 2 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Script to setup pwn environment for CTF with Docker

ancypwn

Ancypwn is your one-key-to-all CTF pwnable challenges environment helper.

It uses docker to manage the tools you might need, so you have separete environment, and you do all the debugging with the shared folder.

(all official pips have been uploaded, enjoy.)

Provided tools

  • pwndbg
  • pwntools
  • keystone assmebler
  • capstone disassembler
  • glibc source and debug version glibc(so we can debug libc with source)
  • Ropper
  • ROPGadgets
  • one_gadget
  • seccomp-tools

Installation

Ancypwn is now plugin based, choose your own plugin or write a new plugin if you need more flexible config/environment support.

Overview

You will need at least 4 parts to have a working environment (apart from docker).

  1. A ancypwn docker image, and is properly tagged as ancypwn:VERSION, VERSION is one of "16.04", "18.04" or "18.10", each represent a corresponding ubuntu version.
  2. ancypwn launcher (pip install ancypwn)
  3. a backend: backend provides ability to listen incoming request to pop up a terminal window, then asks terminal plugin to do it and does different docker container launching strategy (like remote support).
  4. a terminal plugin: this one handles terminal poping up

Backends have the name pattern: ancypwn-backend-*, while terminal plugin has the pattern ancypwn-terminal-*.

So you need:

# download images, and tag them properly
docker pull auxy233/ancypwn:16.04
docker pull auxy233/ancypwn:18.04
docker pull auxy233/ancypwn:18.10
docker image tag auxy233/ancypwn:16.04 ancypwn:16.04
docker image tag auxy233/ancypwn:18.04 ancypwn:18.04
docker image tag auxy233/ancypwn:18.10 ancypwn:18.10

pip3 install ancypwn
# pip3 install ancypwn-backend-* (choose your backend, and install it)
# pip3 install ancypwn-terminal-* (choose your terminal, and install it)

Choose your backend

Current official backends:

Choose your terminal

Current official terminals:

Usage

ancypwn is just a docker launcher, and support one instance at a time.

You can do:

  • ancypwn run: runs the docker, and mount current directory by default to /pwn, then you will be passed to the docker shell, do your debugging here
  • ancypwn end: stops the docker
  • ancypwn attach: ancypwn run may already be done, without ending, you can attach to the previously run instance, then you will be passed to the docker shell.

Internally, ancypwn command can be seen as just a docker commandline runner, so you don't need to remember the sophisticated docker arguments. You can also run your own docker image, by using ancypwn run --image YOUR_IMAGE --tag YOUR_TAG.

To use pwntools gdb.attach function

What the best of ancypwn is its supporting of popping up terminal window and runs command inside. This allows the fluent experience of using pwntools' gdb.attach function to debug target.

To use this, you need to set up your terminal like this:

context.terminal = ['ancyterm', '-s', '[HOST_ADDRESS]', '-p', '15111', '-t', '[TERMINAL]', '-e']

This is a little bit verbose, let me explain:

  • -s [HOST_ADDRESS]: this is required to access host from docker, depends on exact backend. For example, ancypwn-backend-macos backend requires host.docker.internal to be the host address.
  • -p 15111: the port of the server, 15111 by default.
  • -t [TERMINAL]: the terminal plugin name. For example, alacritty for ancypwn-terminal-alacritty.

Configuration

Config is handled by appdirs, under author = Anciety, appname = ancypwn setting. Different OS may have different directory, please refer to appdirs for more information.

When you launch ancypwn the first time, a default configuration will be written to CONFIG_DIR/config.json.

Some of the configurations are:

  • backend: a key-value pair, required at least a "name" to note which backend to use, others are required by specific backend
  • terminal_port: the port to run terminal popping up service, 15111 by default.
  • install_plugin: not available feature for now, ignore it.

Common Problems

Mac OSX "objc[1895]: +[NSString initialize] may have been in progress in another thread when fork() was called."

Reported by one of the users, I haven't met this situation, thus I have no idea why this is happening.

Solution is set this environment variable:

export OBJC_DISABLE_INITIALIZE_FORK_SAFETY=YES

Examples

During CTF games, we usually need a dynamic analysis environment to do all the dynamic stuff, but some challenges may contain extra stuff that may taint your current linux machine.

So, we just use the ancypwn, and do something like this:

# Suppose we have a directory to save all pwnable challenges
# And we run like this

cd pwn
sudo ancypwn run

# Now we are in a docker shell, and do something, like playing with the original binary
# Then we create another terminal, to use gdb to attach it
# The mounted directory are in `/pwn`
cd /pwn
./example_binary

# In another terminal, you should edit your exploit. Set the pwntools settings like above mentioned.
# Then run it like normal.
python exploit.py
# If you used gdb.attach, it should create a new terminal for you.

In general, this simple script only provides you a direct way of using docker. All things are done by docker itself. The script just makes the docker act like a real "virtual machine".

Since many challenges use different libcs, this can also be achieved. By default, "17.10" and "16.04" of ubuntu is provided, if you need others, commit an issue, please. And they can be used use --ubuntu 17.10. 16.04 is used by default.

Status

Current supported ubuntu version:

  • 18.10
  • 18.04
  • 16.04

More Repositories

1

awesome-browser-exploit

awesome list of browser exploitation tutorials
1,920
star
2

linux_kernel_debug_env

How to get a linux kernel debug environment
Shell
32
star
3

dotaxctf

Lua
30
star
4

ancypatch

Forked patchker from patchkit to be easier to use and make code easier to read
C
27
star
5

Rustep

Rust written executable parser
Rust
18
star
6

I-need-help

哇要考试了,还没预习呢,各位有资料不(北京大学软件与微电子)
16
star
7

VegChill

Python
10
star
8

xctf-2019-final-tnj

Tom and Jerry is the best, no doubt.
C
7
star
9

libc_offdb

A little bit easier to find libc offset
Python
6
star
10

rustypwn

Rust
5
star
11

ancyfmtstr

easy format string bug exploit generation tool
Python
4
star
12

my-configs

Shell
4
star
13

mos6502-emulator-debugging

forked mos6502 debugging written during WCTF
C++
4
star
14

sleigh

Rust
4
star
15

scripts

Anciety's personal scripts
Python
3
star
16

binja-kersyms

Python
3
star
17

QWB2020-final-sort

强网杯2020决赛 sort 题目汇编器和快排程序
Python
3
star
18

ancyflypy

Python
2
star
19

cmu-15-411-lab

Rust
2
star
20

vb3-kaitai

2
star
21

ctfbot-lark

2
star
22

VegChillBook

2
star
23

castlefight-cn

Objective-J
1
star
24

r2pipe_deno

TypeScript
1
star
25

source2-vpk-tpl

Source 2 engine vpk file format 010 editor template
1
star
26

bang-experiment

C++
1
star
27

ghidracula

Ghidra in real darkmode
1
star
28

gosp

Go
1
star
29

vim-ddlog

Vim Script
1
star
30

object-algebra-example-rust

Object Algebra Example in Rust!
1
star
31

extract_kern_size

A simple script to extract kernel image sizes to be later used when confronting kernel UAF exploit.
Python
1
star
32

bevy-midi

1
star
33

ancypwn-terminal-iterm2

Python
1
star
34

bevy_rts_base

Rust
1
star
35

dotaxctf-contents

CSS
1
star
36

ancypwn-backend-unix

Python
1
star
37

applied-crypto-assignment

Rust
1
star