Skip to main content

Python library to automate gdb debugging

Project description

GDB+

Python library to automate gdb debugging

GDB+ is a wrapper around gdb powered by pwntools. The goal is automate your interactions with gdb and add some extra features.

Main features

  • Include a python function as callback when you set a breakpoint.
  • Read the canary instead of bruteforcing it every time you need it while testing your exploit.
  • Test a specific function of a binary with the parameters you want at any time.
  • Log the code of a self modifying function.
  • Backup parts of your memory and restore it during future executions.
  • Don't waste time commenting your code. The arguments NOPTRACE and REMOTE make the exploit skip any action related to gdb.

Installation

stable

pip3 install gdb_plus

or dev branch

pip3 install git+https://github.com/Angelo942/gdb_plus.git@dev

Warning for pwndbg users:
Previous bugs in Pwndbg used to break the api for python. While most of GDB+ should work with the current version of pwndbg [19/12/2022], pwndbg can not debug both processes after a fork, making it almost impossible to use features such as the emulation of ptrace.
you are strongly advised to use GEF instead.

Debugging

You can debug a program using the path to the binary.
If you really have to you can also use a process or even just his pid. For pwn challenges set the remote address with Debugger().remote(<host>, <port>) and use the argument REMOTE once you want to exploit the server

from gdb_plus import *

gdbinit = """
handle SIGALRM nopass
"""

dbg = Debugger("./rev_challenge", script=gdbinit, aslr=False)
dbg = Debugger("./pwn_challenge", script=gdbinit).remote("10.10.0.1", 1337)


p = process("./challenge", aslr=False)
dbg = Debugger(p, script=gdbinit)

#pidof process : 3134
dbg = Debugger(3134, script=gdbinit, binary="./challenge")

By default your process will be analysed from the first instruction of the loader. If the process you are debugging has some checks you want to avoid use Debugger(..., debug_from=<address>) to attach with gdb at a specific address.
This will block you script until you reach you address. If you need to execute code in between you can use the non blocking alternative:

Im_done = Event()
dbg = Debugger("./challenge").debug_from("main+0x34", event=Im_done)
dbg.p.sendline("this is my input")
Im_done.set()
dbg.debug_from_done.wait()

This should pass any check for a debugger, even searches for INT3, exept a full check that the memory hasn't been edited.

Calling your script with pwntools arguments NOPTRACE or REMOTE will allow you to disable all actions related to gdb and test your exploit localy or attack the remote target without having to comment anything. If you want a finer control you can use ìf dbg.debugging to discriminate the code that should be executed when gdb is opened or not.

Note
Debugger can also take as parameter a dictionary for the environment variables. You CAN use it to preload libraries, but if you want to do it for the libc I would advise to patch the rpath of the binary instead (if you don't know how take a look at spwn or pwninit. This will prevent problems when running system("/bin/sh") that will fail due to LD_PRELOAD and may hide other problems in your exploit.

Warning
Old versions of gdbserver (< 11.0.50) have problems launching 32bit binaries. If you see a crash trying to find the canary use from_start=False as parameter for the debugger. This will launch the process and then attach to it once the memory has been correctly mapped. Letting from_start=True may also cause problems if the environment variables are important to your exploit since they will be mixed with some set up by gdbserver.

Control Flow

The main actions for gdb are already wrapped in individual methods. For all commands not present you can reconstruct them by calling dbg.execute(<command>) as if you where using gdb. Just make sure to use dbg.execute_action(<command>) if your command will require you to call dbg.wait().

dbg.jump() # set instruction pointer to specific address
dbg.step() # Single instruction (will enter function calls)
dbg.next() # Next instruction (will jump over function calls)
dbg.cont() # Continue execution
dbg.continue_until() # Continue until you reach a specific location
dbg.finish() # Finish current function
dbg.interrupt() # Stop the execution of your process
dbg.wait() # Wait until you have control of gdb

In the cases where you have to interact with the process before reaching the address you want or if you would like to put some more breakpoints on the way to play manually with gdb you can use wait=False

...
dbg.breakpoint("main+0x12", temporary=True)
dbg.breakpoint(0x23, temporary=True)
done = dbg.continue_until("main+0x43", wait=False)
dbg.p.recvline()
dbg.p.sendline(b"4")
done.wait()
# Here the script will wait until you reach the offset 0x43 from main while gdb will break at offset 0x12 and 0x23 to let you look at the process
...

Warning

  • finish can only work if the stack frame hasn't been corrupted. With libdebug it will fail if the function doesn't use the base pointer.
  • Try avoiding interrupt as much as possible.
  • You may be tempted to do dbg.instruction_pointer = dbg.parse_address(location), but a bug in gdb may cause an unexpected behaviour if you do so. Use dbg.jump(location) instead

If the function modifies itself you may find yourself unable to set breakpoints where you want. To analyse these function we can run them step by step

def MyCallback(dbg):
    if dbg.next_inst.mnemonic == "int3":
        dbg.step()
        dbg.signal("SIGINT")
    print(dbg.next_inst.toString())

dbg.step_until_ret(MyCallback)

In this example at each step the callback will be executed decrypting the next function chunk by chunk and logging the instructions. See this example for more details solving a real challenge.

You could also use dbg.step_until_address(<address>, <callback=None>) if you just want to execute a limited area of code or dbg.step_until_condition(<check>) if you are not sure where to stop.

Breakpoints

Breakpoints have three main features:

  • if the address is smaller than 0x10000 the address will immediately be interpreted as relative for PIE binaries
  • you can use a symbol name instead of an address such as "main" or "main+0x12"
  • you can set callbacks to be executed when the breakpoint is reach and may choose to let the process continue after the execution.

The callback is a function that takes the debugger as parameter and returns a boolean to tell gdb if it should stop or not. The callbacks shouldn't be limited in what you can code. If you find problems raise an issue. If you want to pass data from your callback function to your exploit you can use pointers (lists, dictionaries or queues)

Note
Setting a breakpoint requires the process to be interrupted.

from gdb_plus import *
from queue import Queue

# I let the process run in this example to reinforce the need for the interrupt later
gdbinit = """
handle SIGALRM nopass
"""

dbg = Debugger("./challenge", script=gdbinit).remote("leet.pwn.com", 31337)
pointer = Queue()

# step over an hypothetical call to a function, overwrite the return value and save it in a queue
def MyCallback(dbg):
    dbg.next()
    log.info(f"I tried to return {dbg.rax}")
    pointer.put(dbg.rax)
    dbg.rax = 0
    # Return False to let the process run after executing the callback
    return False

def SecondCallback(dbg):
    log.info("now you can play around with gdb")
    log.info("once you are done execute continue in gdb and your script will resume once we reach main+0x534")
    # Return True to interrupt the process
    return True

# You can not set a breakpoint while the process is running
dbg.breakpoint("main+0x42", callback=MyCallback, temporary = True)
dbg.breakpoint("main+0x124", callback=SecondCallback)
dbg.cont(until="main+0x534")

# Read the data set by the breakpoint
print(pointer_to_secret.get())
dbg.delete_breakpoint("main+0x124")

Warning You can script anything inside your callbacks, but be careful not to break the execution flow of your script. A putting a callback with finish() inside a function you are stepping over with ni() may cause problems. The alternative would be to set a second callback on the return_pointer of your function.

from gdb_plus import *
from queue import Queue

# I let the process run in this example to reinforce the need for the interrupt later
gdbinit = """
handle SIGALRM nopass
"""

dbg = Debugger("./challenge", script=gdbinit).remote("leet.pwn.com", 31337)

# Does work, but you may lose control of your script if you try to step over a call to waitpid
def dangerous_callback(dbg):
    status = dbg.args[1]
    dbg.finish()
    log.info(f"Child stopped with status : {hex(u32(dbg.read(status, 4)))}")
    return False

def safe_callback(dbg):
    status = dbg.args[1]
    def second_callback(dbg):
        log.info(f"Child stopped with status : {hex(u32(dbg.read(status, 4)))}")
        return False
    dbg.b(dbg.return_pointer, callback=second_callback, temporary=True)
    return False

dbg.b("waitpid", callback=safe_callback)

You can allocate chunks on the heap (or the bss if you don't have the libc), write and read in the ram and read the canary from anywhere.

pointer = dbg.alloc(8)
dbg.write(pointer, p64(0xdeadbeef))
secret = dbg.read(dbg.elf.symbols["secret"], 0x10)
canary = dbg.canary

Note
While you can access the registers only when the process is at a stop, remember that you can read and write on the memory at any time

Pwntools let you access the address where each library is loaded with p.libs()[<path_to_library>] We have two wrapper for the main ones:

  • dbg.base_elf
  • dbg.base_libc

from gdb_plus >= 5.4.0 dbg.elf.address is already set to the correct address even with ASLR on, so you may need dbg.base_elf only if you debug a process for wich you don't have the binary

We can also use capstone to know what is the next instruction that will be executed

print(dbg.next_inst.toString()) # "mov rax, r12"
print(dbg.next_inst.mnemonic)   # "mov"

Fork

You can set the debugger to spwn a new instance of gdb every time the process calls fork with dbg.set_split_on_fork(). The child will stop as soon as the process is created by fork, but will wait for the debugger to stop before creating the new object

dbg = Debugger("http_server").set_split_on_fork()
done = dbg.continue_until(0x40233)
dbg.p.sendline("input")
done.wait()
# Now that the process stopped at address 0x40233 a new debugger will attach to the child
pid_child = dbg.wait_split()

# all children have their debugger saved in dbg.children and can be accessed by the pid
child = dbg.children[pid_child]

If the program traces its child to make sure you aren't debugging it or to unpack a region of code, you should be able to emulate the calls to ptrace.

child.emulate_ptrace_slave(dbg)
dbg.emulate_ptrace_master(child)

This will interrupt the process at every call to waitpid for the master and SIGSTOP or INT3 for the child. You have to handle yourself when to let each one of them continue while you debug them. To help you a bit we print "Slave can continue" every time the tracer tries to send a continue to the tracee

Warning

  • If the tracee stopped with a SIGSTOP gdb may bug a bit and you may need force=True to make it continue correctly
  • pwndbg can not handle multi-process applications and this section is only possible in native gdb or with GEF
  • Handleling multiple processes in the same debugger instead of splitting them may cause problems whith the waits

Call functions

If you want to test the effects of a specific function you can directly call it with the parameters you want

pointer = dbg.alloc(100)
# Initialize data
dbg.write(pointer, bytes([i for i in range(100)]))
dbg.call(dbg.p.symbols["obfuscated_pbox"], [pointer, "user_1", 1])
dbg.read(pointer, 100)

See this example for more details

Note
You can pass parameters as strings or byte_arrays. By default they will be saved on the heap with a null terminator in the case of a string. If you can't use the heap set heap=False

Warning
If the stack frame has been corrupted finish() may not work. If this is the case set last address of your function in call(..., end_pointer= ...).

Libdebug

By default GDB+ uses a gdbserver to debug the process. This is verry usefull when you also have to check manually gdb while you are writing a script, but can be verry slow. For this reason we now support libdebug (from version >= 0.4) as an alternative debugger. It is lacking a lot of features but can do the job for most tasks and it can be 50 times faster.

The debugger will always start with dbg, but you can switch back and forth

dbg = Debugger(<binary>)
# switch to libdebug
dbg.migrate(libdebug=True)
# switch to gdb
dbg.migrate(gdb=True)

To access properties of libdebug that haven't been wrapped you can simply use dbg.libdebug as you would with dbg.gdb.

When you switch the breakpoints and callbacks will be preserved except for those needed to emulate ptrace. Please migrate to libdebug before setting the emulator up or disable it and set it up again right after.

Since libdebug isn't on PyPI yet we could't include it in the dependencies. You can install it manually: pip3 install git+https://github.com/Angelo942/libdebug.git@parallel

AARCH64

Arm binaries ar now partially supported. The problem running them in qemu is that we can't access the pid of the process from gdb and we can't catch when the process forks. This limits the feature we can use, but the rest is working fine.

Note

  • set context.arch == "aarch64" at the beggining of your script
  • pwndbg may be better than GEF when using qemu. In particular if you find gdb always debugging qemu instead of your process and you are sure you set the correct context you may want to try switching to pwndbg for this part.

TODO

  • Distinguish between process running and dead
  • Identify actions performed manually in gdb (overwrite finish and ni)
  • Improve ptrace emulation
    • handle waitpid(-1) with multiple slaves
    • emulate waitid too
  • improve support ARM binaries
    • how to specify libraries ? (-L /usr/aarch64-linux-gnu)
    • features for native arch
    • arm 32 bit
  • support multithread applications
  • catch sigsegv as an exit instead of user interaction
  • enable signal() with libdebug
  • force parent or child to stop tracing
  • wrap follow-child
  • specify relative addresses

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

gdb_plus-6.4.2.tar.gz (72.2 kB view details)

Uploaded Source

Built Distribution

gdb_plus-6.4.2-py3-none-any.whl (63.2 kB view details)

Uploaded Python 3

File details

Details for the file gdb_plus-6.4.2.tar.gz.

File metadata

  • Download URL: gdb_plus-6.4.2.tar.gz
  • Upload date:
  • Size: 72.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.10.12

File hashes

Hashes for gdb_plus-6.4.2.tar.gz
Algorithm Hash digest
SHA256 e855b028db6e2a9058d5e55d622dff859de104e57321ac074e04dd4b76c79b37
MD5 9a31180a3a0dc01bdfafa3c57bcbdb4b
BLAKE2b-256 3bb247e3e369f4a7a6932c8997cd570583c9aa7b55aaffa336a54da2d63cee7c

See more details on using hashes here.

File details

Details for the file gdb_plus-6.4.2-py3-none-any.whl.

File metadata

  • Download URL: gdb_plus-6.4.2-py3-none-any.whl
  • Upload date:
  • Size: 63.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.10.12

File hashes

Hashes for gdb_plus-6.4.2-py3-none-any.whl
Algorithm Hash digest
SHA256 3e5fb9685dd7e08e67912c9cef571191c7ae3936dac3294a8e2b100ebe7856b7
MD5 47246964241c1cb825e3c1f1e14e3ddc
BLAKE2b-256 ca0afe2fbe030a4d24136d67f2957e935f36744b47121221e8202c9e44e01b63

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page