InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

Reverse Engineering a Native Desktop Application (Tauri App)

Felix Alexander
InfoSec Write-ups
Published in
23 min readDec 5, 2022
Tauri Natives App

The Background

Tauri vs Electron.js Comparison

“From Dev to Rev” Perspectives

{
"$schema": "../../core/config-schema/schema.json",
"build": {
"distDir": ["index.html"],
"devPath": ["index.html"],
"beforeDevCommand": "",
"beforeBuildCommand": ""
},
"package": {
"productName": "The Basic Rookie Dev App",
"version": "0.1.0"
},
"tauri": {
"bundle": {
"active": true,
"targets": "all",
"identifier": "com.tauri.dev",
"icon": [
"../.icons/32x32.png",
"../.icons/128x128.png",
"../.icons/128x128@2x.png",
"../.icons/icon.icns",
"../.icons/icon.ico"
],
"resources": [],
"externalBin": [],
"copyright": "",
"category": "DeveloperTool",
"shortDescription": "",
"longDescription": "",
"deb": {
"depends": []
},
"macOS": {
"frameworks": [],
"exceptionDomain": ""
}
},
"allowlist": {
"all": false
},
"windows": [
{
"title": "Aseng was here~!",
"width": 800,
"height": 600,
"resizable": true,
"fullscreen": false
}
],
"security": {
"csp": "default-src 'self'"
}
}
#![cfg_attr(
all(not(debug_assertions), target_os = "windows"),
windows_subsystem = "windows"
)]


fn main() {
tauri::Builder::default()
.run(tauri::generate_context!(
"../../examples/helloworld/tauri.conf.json"
))
.expect("error while running tauri application");
}
use tauri_utils::assets::AssetKey;
use tauri_utils::config::{AppUrl, Config, PatternKind, WindowUrl};
use tauri_utils::html::{
inject_nonce_token, parse as parse_html, serialize_node as serialize_html_node,
};

#[cfg(feature = "shell-scope")]
use tauri_utils::config::{ShellAllowedArg, ShellAllowedArgs, ShellAllowlistScope};

use crate::embedded_assets::{AssetOptions, CspHashes, EmbeddedAssets, EmbeddedAssetsError};

/// Necessary data needed by [`context_codegen`] to generate code for a Tauri application context.
pub struct ContextData {
pub dev: bool,
pub config: Config,
pub config_parent: PathBuf,
pub root: TokenStream,
}

fn map_core_assets(
options: &AssetOptions,
target: Target,
) -> impl Fn(&AssetKey, &Path, &mut Vec<u8>, &mut CspHashes) -> Result<(), EmbeddedAssetsError> {
#[cfg(feature = "isolation")]
let pattern = tauri_utils::html::PatternObject::from(&options.pattern);
let csp = options.csp;
let dangerous_disable_asset_csp_modification =
options.dangerous_disable_asset_csp_modification.clone();
move |key, path, input, csp_hashes| {
if path.extension() == Some(OsStr::new("html")) {
#[allow(clippy::collapsible_if)]
if csp {
let mut document = parse_html(String::from_utf8_lossy(input).into_owned());

if target == Target::Linux {
::tauri_utils::html::inject_csp_token(&mut document);
}

inject_nonce_token(&mut document, &dangerous_disable_asset_csp_modification);

if dangerous_disable_asset_csp_modification.can_modify("script-src") {
if let Ok(inline_script_elements) = document.select("script:not(empty)") {
let mut scripts = Vec::new();
for inline_script_el in inline_script_elements {
let script = inline_script_el.as_node().text_contents();
let mut hasher = Sha256::new();
hasher.update(&script);
let hash = hasher.finalize();
scripts.push(format!("'sha256-{}'", base64::encode(hash)));
}
csp_hashes
.inline_scripts
.entry(key.clone().into())
.or_default()
.append(&mut scripts);
}
}

#[cfg(feature = "isolation")]
if dangerous_disable_asset_csp_modification.can_modify("style-src") {
if let tauri_utils::html::PatternObject::Isolation { .. } = &pattern {
// create the csp for the isolation iframe styling now, to make the runtime less complex
let mut hasher = Sha256::new();
hasher.update(tauri_utils::pattern::isolation::IFRAME_STYLE);
let hash = hasher.finalize();
csp_hashes
.styles
.push(format!("'sha256-{}'", base64::encode(hash)));
}
}

*input = serialize_html_node(&document);
}
}
Ok(())
}
}

//.... [SNIP] .......

let app_url = if dev {
&config.build.dev_path
} else {
&config.build.dist_dir
};

let assets = match app_url {
AppUrl::Url(url) => match url {
WindowUrl::External(_) => Default::default(),
WindowUrl::App(path) => {
if path.components().count() == 0 {
panic!(
"The `{}` configuration cannot be empty",
if dev { "devPath" } else { "distDir" }
)
}
let assets_path = config_parent.join(path);
if !assets_path.exists() {
panic!(
"The `{}` configuration is set to `{:?}` but this path doesn't exist",
if dev { "devPath" } else { "distDir" },
path
)
}
EmbeddedAssets::new(assets_path, &options, map_core_assets(&options, target))?
}
_ => unimplemented!(),
},
AppUrl::Files(files) => EmbeddedAssets::new(
files
.iter()
.map(|p| config_parent.join(p))
.collect::<Vec<_>>(),
&options,
map_core_assets(&options, target),
)?,
_ => unimplemented!(),
};

// ..... [SNIP] ......

We are interested in how Tauri App protects our assets. Are they encrypted? Are they stored in a different format from a transformation process? Are they stored in a Tauri special Cloud Storage? Or are they stored in a plain text thus left unprotected?

/// Represents a container of file assets that are retrievable during runtime.
pub trait Assets: Send + Sync + 'static {
/// Get the content of the passed [`AssetKey`].
fn get(&self, key: &AssetKey) -> Option<Cow<'_, [u8]>>;

/// Gets the hashes for the CSP tag of the HTML on the given path.
fn csp_hashes(&self, html_path: &AssetKey) -> Box<dyn Iterator<Item = CspHash<'_>> + '_>;
}

/// [`Assets`] implementation that only contains compile-time compressed and embedded assets.
#[derive(Debug)]
pub struct EmbeddedAssets {
assets: phf::Map<&'static str, &'static [u8]>,
// Hashes that must be injected to the CSP of every HTML file.
global_hashes: &'static [CspHash<'static>],
// Hashes that are associated to the CSP of the HTML file identified by the map key (the HTML asset key).
html_hashes: phf::Map<&'static str, &'static [CspHash<'static>]>,
}

impl EmbeddedAssets {
/// Creates a new instance from the given asset map and script hash list.
pub const fn new(
map: phf::Map<&'static str, &'static [u8]>,
global_hashes: &'static [CspHash<'static>],
html_hashes: phf::Map<&'static str, &'static [CspHash<'static>]>,
) -> Self {
Self {
assets: map,
global_hashes,
html_hashes,
}
}
}

impl Assets for EmbeddedAssets {
#[cfg(feature = "compression")]
fn get(&self, key: &AssetKey) -> Option<Cow<'_, [u8]>> {
self
.assets
.get(key.as_ref())
.map(|&(mut asdf)| {
// with the exception of extremely small files, output should usually be
// at least as large as the compressed version.
let mut buf = Vec::with_capacity(asdf.len());
brotli::BrotliDecompress(&mut asdf, &mut buf).map(|()| buf)
})
.and_then(Result::ok)
.map(Cow::Owned)
}

#[cfg(not(feature = "compression"))]
fn get(&self, key: &AssetKey) -> Option<Cow<'_, [u8]>> {
self
.assets
.get(key.as_ref())
.copied()
.map(|a| Cow::Owned(a.to_vec()))
}
Tauri Asset Compression Features

Diving into the Challenge

Tauri App Binary
// ... [SNIP] ...
do
{
v21 = v20 + 1;
if ( v20 == -1 )
std::thread::ThreadId::new::exhausted::h8b15b09161259129();
v22 = v20;
v20 = _InterlockedCompareExchange64(&std::thread::ThreadId::new::COUNTER::h3a05da468aebc0a6, v21, v20);
}
while ( v22 != v20 );
v19[4] = (void *)v21;
*((_DWORD *)v19 + 10) = 0;
fds.sa_handler = v12;
fds.sa_mask.__val[0] = v3;
fds.sa_mask.__val[1] = v4;
std::sys_common::thread_info::set::hd2260a9241afaa5b();
std::sys_common::backtrace::__rust_begin_short_backtrace::h9567a838cd73883d(&helloworld::main::hf56bc84460f29d43);
if ( std::rt::cleanup::CLEANUP::h49cafe1e845be7b2 != 3 )
{
LOBYTE(v25) = 1;
fds.sa_handler = (__sighandler_t)&v25;
std::sync::once::Once::call_inner::he7c95df8c763a30d();
}

// ... [SNIP] ...
qmemcpy(v7, "flag-viewer", 11);
v10 = alloc::raw_vec::RawVec$LT$T$C$A$GT$::allocate_in::h0ef84f43d0508836(5uLL);
v12 = v11;
*(_DWORD *)v10 = 774975024;
*(_BYTE *)(v10 + 4) = 48;
v13 = _rust_alloc(0x138uLL, 8uLL);
if ( !v13 )
goto LABEL_25;
v14 = v13;
v131 = v2;
v132 = v12;
v133 = v10;
v134 = v7;
*(_QWORD *)v250 = alloc::raw_vec::RawVec$LT$T$C$A$GT$::allocate_in::h0ef84f43d0508836(4uLL);
*(_QWORD *)&v250[8] = v15;
**(_DWORD **)v250 = 1852399981;
*(_QWORD *)&v250[16] = 4LL;
std::sys::unix::os_str::Slice::to_owned::hafd5ea8305043fe1();
v16 = (void *)alloc::raw_vec::RawVec$LT$T$C$A$GT$::allocate_in::h0ef84f43d0508836(0xBuLL);
qmemcpy(v16, "Flag Viewer", 11);
qmemcpy((void *)v14, v250, 0x40uLL);
*(_DWORD *)(v14 + 64) = *(_DWORD *)&v250[64];
*(_DWORD *)(v14 + 68) = 2;
*(_QWORD *)(v14 + 112) = 0LL;
*(_QWORD *)(v14 + 136) = 0LL;
*(_QWORD *)(v14 + 152) = 0LL;
*(_QWORD *)(v14 + 168) = 0x4089000000000000LL;
*(_QWORD *)(v14 + 176) = 0x4082C00000000000LL;
*(_QWORD *)(v14 + 184) = 0LL;
*(_QWORD *)(v14 + 200) = 0LL;
*(_QWORD *)(v14 + 216) = 0LL;
*(_QWORD *)(v14 + 232) = 0LL;
*(_QWORD *)(v14 + 248) = v16;
*(_QWORD *)(v14 + 256) = v17;
*(_QWORD *)(v14 + 264) = 11LL;
*(_QWORD *)(v14 + 272) = 0LL;
*(_QWORD *)(v14 + 296) = 0x100000100010001LL;
*(_DWORD *)(v14 + 304) = 33554433;
*(_WORD *)(v14 + 308) = 0;
v135 = v14;
*(_BYTE *)(v14 + 310) = 0;
v18 = (void *)alloc::raw_vec::RawVec$LT$T$C$A$GT$::allocate_in::h0ef84f43d0508836(0xDuLL);
v129 = v19;
qmemcpy(v18, "com.tauri.dev", 13);
v130 = v18;
v20 = _rust_alloc(0x78uLL, 8uLL);
if ( !v20 )
goto LABEL_25;
v21 = (_QWORD *)v20;
v22 = alloc::raw_vec::RawVec$LT$T$C$A$GT$::allocate_in::h0ef84f43d0508836(0x13uLL);
v84 = v23;
*(_OWORD *)v22 = *(_OWORD *)"../.icons/32x32.png../.icons/128x128.png../.icons/128x128@2x.png../.icons/icon.icns../.icons/icon.icodefault-src 'self'public";
*(_DWORD *)(v22 + 15) = 1735290926;
v24 = alloc::raw_vec::RawVec$LT$T$C$A$GT$::allocate_in::h0ef84f43d0508836(0x15uLL);
v82 = v25;
*(_QWORD *)(v24 + 13) = 0x676E702E38323178LL;
*(_OWORD *)v24 = *(_OWORD *)"../.icons/128x128.png../.icons/128x128@2x.png../.icons/icon.icns../.icons/icon.icodefault-src 'self'public";
v26 = alloc::raw_vec::RawVec$LT$T$C$A$GT$::allocate_in::h0ef84f43d0508836(0x18uLL);
v80 = v27;
*(_QWORD *)(v26 + 16) = 0x676E702E78324038LL;
*(_OWORD *)v26 = *(_OWORD *)"../.icons/128x128@2x.png../.icons/icon.icns../.icons/icon.icodefault-src 'self'public";
v28 = alloc::raw_vec::RawVec$LT$T$C$A$GT$::allocate_in::h0ef84f43d0508836(0x13uLL);
v79 = v29;
*(_OWORD *)v28 = *(_OWORD *)"../.icons/icon.icns../.icons/icon.icodefault-src 'self'public";
*(_DWORD *)(v28 + 15) = 1936614249;
v30 = alloc::raw_vec::RawVec$LT$T$C$A$GT$::allocate_in::h0ef84f43d0508836(0x12uLL);
v21[12] = v30;
v21[13] = v31;
*(_OWORD *)v30 = *(_OWORD *)"../.icons/icon.icodefault-src 'self'public";
*(_WORD *)(v30 + 16) = 28515;
v431 = "Tauri Programme within The Commons ConservancyMake tiny, secure apps for all desktop platforms with Taurierror "
"while running tauri application";
v432 = 46LL;
v433 = "Make tiny, secure apps for all desktop platforms with Taurierror while running tauri application";
v434 = 59LL;
((void (__fastcall *)(_BYTE *, _BYTE *, _BYTE *))tauri::app::Builder$LT$R$GT$::build::h7c64c955f54959e3)(
v246,
v238,
v250);
memcpy(v225, &v246[1], 0x5FuLL);
if ( v247 != 3 )
{
memcpy(&v250[96], &v246[96], 0x90uLL);
qmemcpy(&v250[248], v248, 0x68uLL);
v250[0] = v246[0];
memcpy(&v250[1], v225, 0x5FuLL);
*(_QWORD *)&v250[240] = v247;
((void (__fastcall *)(__m256i *, _BYTE *))_$LT$tauri..app..AppHandle$LT$R$GT$$u20$as$u20$core..clone..Clone$GT$::clone::h22f9c9fdb5774633)(
v236,
&v250[224]);
v59 = *(_QWORD *)&v250[216];
v60 = _InterlockedIncrement64(*(volatile signed __int64 **)&v250[216]);
if ( !((v60 < 0) ^ v61 | (v60 == 0)) )
{
if ( *(_QWORD *)&v250[16] == 3LL )
core::panicking::panic::hf0565452d0d0936c();
*(_OWORD *)v238 = *(_OWORD *)v250;
*(_QWORD *)&v238[16] = *(_QWORD *)&v250[16];
memcpy(&v238[24], &v250[24], 0xC0uLL);
v62 = *(_QWORD *)&v238[88];
v63 = _InterlockedIncrement64(*(volatile signed __int64 **)&v238[88]);
if ( !((v63 < 0) ^ v61 | (v63 == 0)) )
{
v64 = *(_QWORD *)v238;
v65 = _InterlockedIncrement64(*(volatile signed __int64 **)v238);
if ( !((v65 < 0) ^ v61 | (v65 == 0)) )
{
v66 = *(_QWORD *)&v238[80];
v67 = ((__int64 (__fastcall *)(_BYTE *))tao::event_loop::EventLoop$LT$T$GT$::create_proxy::h6f86f7baa55289ee)(&v238[120]);
qmemcpy(v226, &v238[120], sizeof(v226));
*(_QWORD *)&v246[16] = *(_QWORD *)&v238[112];
*(_OWORD *)v246 = *(_OWORD *)&v238[96];
*(_QWORD *)&v246[24] = v67;
*(_QWORD *)&v246[32] = v68;
qmemcpy(&v246[40], v236, 0x80uLL);
*(_QWORD *)&v246[168] = v59;
*(_QWORD *)&v246[176] = v64;
*(_QWORD *)&v246[184] = v62;
*(_QWORD *)&v246[192] = v66;
((void (__fastcall __noreturn *)(__m256i *, _BYTE *))tao::event_loop::EventLoop$LT$T$GT$::run::h9b4fce1a6961520f)(
v226,
v246);
}
}
}
BUG();
}
memcpy(v238, v225, 0x5FuLL);
if ( v246[0] != 28 )
{
v250[0] = v246[0];
memcpy(&v250[1], v238, 0x5FuLL);
LABEL_31:
core::result::unwrap_failed::hfaddf24b248137d3();
}
if ( v120 )
free(v119);
((void (__fastcall *)(__int64 *))core::ptr::drop_in_place$LT$tauri_utils..config..FsAllowlistScope$GT$::h59f25386f9484a44)(&v174);
v54 = (void *)v180;
((void (__fastcall *)(__int64, __int64))_$LT$alloc..vec..Vec$LT$T$C$A$GT$$u20$as$u20$core..ops..drop..Drop$GT$::drop::h7a5477a2103cf4a6)(
v180,
v181.m256i_i64[1]);
if ( v181.m256i_i64[0] )
free(v54);
if ( v181.m256i_i64[2] && v181.m256i_i64[3] )
free((void *)v181.m256i_i64[2]);
v55 = (char *)v184;
if ( *((_QWORD *)&v185 + 1) )
{
v56 = 88LL * *((_QWORD *)&v185 + 1);
v57 = 0LL;
do
{
if ( *(_QWORD *)&v55[v57 + 8] )
free(*(void **)&v55[v57]);
v57 += 88LL;
}
while ( v56 != v57 );
}
if ( (_QWORD)v185 )
free(v55);
((void (__fastcall *)(__int64 *))core::ptr::drop_in_place$LT$tauri_utils..config..FsAllowlistScope$GT$::h59f25386f9484a44)(&v187);
((void (__fastcall *)(__int64, _QWORD))_$LT$alloc..vec..Vec$LT$T$C$A$GT$$u20$as$u20$core..ops..drop..Drop$GT$::drop::h7a5477a2103cf4a6)(
8LL,
0LL);
((void (__fastcall *)(__int64 *))core::ptr::drop_in_place$LT$tauri_utils..config..FsAllowlistScope$GT$::h59f25386f9484a44)(&v232);
return ((__int64 (__fastcall *)(__int64 *))core::ptr::drop_in_place$LT$tauri_utils..config..FsAllowlistScope$GT$::h59f25386f9484a44)(&v227);
}
Tauri App Builder Control Flow XREFS

The Art of Deconstructors

#include <stdio.h>
void pre_main() __attribute__((constructor));
void post_main() __attribute__((destructor));

void pre_main() {
puts("Yup I'm called before the main() function");
}

void post_main() {
puts("Eh? I'm called after all the main() is completed! No matter how many iterations ~");
}

int main() {
puts("Hello seng.");
return 0;
}
Tauri App Binary Exports
GDB Debugging
Vidner Strings Indication in Heap Memory
gef➤  x/10s 0x5555559c7289-200
0x5555559c71c1: "a\322UUU"
0x5555559c71c7: ""
0x5555559c71c8: "\360a\322UUU"
0x5555559c71cf: ""
0x5555559c71d0: "<head>\n <meta charset=\"UTF-8\">\n <meta content=\"ie=edge\" http-equiv=\"X-UA-Compatible\">\n <meta content=\"width=device-width, initial-scale=1.0\" name=\"viewport\">\n <meta content=\"vidner\" name=\"author\">\n <title>Flag Viewer</title>\n <link href=\"https://fonts.gstatic.com\" rel=\"preconnect\">\n <link href=\"https://fonts.googleapis.com/css2?family=Poppins:wght@400;500;600;700&amp;display=swap\" rel=\"stylesheet\">\n <link href=\"./css/styles.css\" rel=\"stylesheet\">\n <meta content=\"script-src 'self' 'sha256-LiAOJW+SxhRQ1D3FA8oo/AjCouFSGU4xYS5EfRdWEx4=' 'sha256-47DEQpj8HBSa+/TImW+5JCeuQeRkm5NMpJWZG3hSuFU='; default-src 'self'\" http-equiv=\"Content-Security-Policy\"></head>\n <body>\n <header>\n <div class=\"logo\">\n <img alt=\"logo\" src=\"./images/logo.svg\">\n </div>\n <button class=\"btn\">\n <img alt=\"About\" src=\"./images/icon-hamburger.svg\">\n </button>\n </header>\n <main>\n <button id=\"prev\">&lt;</button>\n <div class=\"card-container\"></div>\n <button id=\"next\">&gt;</button>\n <div class=\"about\">\n <h1>About</h1>\n <p id=\"changeme\">This is a release build, have fun with it.</p>\n <h2>- vidner</h2>\n <div>\n <h3 id=\"message\">Upgrade</h3>\n <br>\n <input id=\"key\" name=\"key\" placeholder=\"password-that-you-guys-need-to-have\" type=\"text\">\n <button id=\"upgrade\" name=\"upgrade\">⬆</button>\n </div>\n </div>\n </main>\n <script src=\"./js/scripts.js\"></script>\n \n\n</body></html>U"
<head>
<meta charset=\ "UTF-8\">
<meta content=\ "ie=edge\" http-equiv=\ "X-UA-Compatible\">
<meta content=\ "width=device-width, initial-scale=1.0\" name=\ "viewport\">
<meta content=\ "vidner\" name=\ "author\">
<title>Flag Viewer</title>
<link href=\ "https://fonts.gstatic.com\" rel=\ "preconnect\">
<link href=\ "https://fonts.googleapis.com/css2?family=Poppins:wght@400;500;600;700&amp;display=swap\" rel=\ "stylesheet\">
<link href=\ "./css/styles.css\" rel=\ "stylesheet\">
<meta content=\ "script-src 'self' 'sha256-LiAOJW+SxhRQ1D3FA8oo/AjCouFSGU4xYS5EfRdWEx4=' 'sha256-47DEQpj8HBSa+/TImW+5JCeuQeRkm5NMpJWZG3hSuFU='; default-src 'self'\" http-equiv=\ "Content-Security-Policy\">
</head>

<body>
<header>
<div class=\ "logo\"> <img alt=\ "logo\" src=\ "./images/logo.svg\"> </div>
<button class=\ "btn\"> <img alt=\ "About\" src=\ "./images/icon-hamburger.svg\"> </button>
</header>
<main>
<button id=\ "prev\">&lt;</button>
<div class=\ "card-container\"></div>
<button id=\ "next\">&gt;</button>
<div class=\ "about\">
<h1>About</h1>
<p id=\ "changeme\">This is a release build, have fun with it.</p>
<h2>- vidner</h2>
<div>
<h3 id=\ "message\">Upgrade</h3>
<br>
<input id=\ "key\" name=\ "key\" placeholder=\ "password-that-you-guys-need-to-have\" type=\ "text\">
<button id=\ "upgrade\" name=\ "upgrade\"></button>
</div>
</div>
</main>
<script src=\ "./js/scripts.js\"></script>
</body>

</html>
Key Pattern Indication
gef➤  x/s 0x555555ce39db-443
0x555555ce3820: "lags/ukraine.png',\n title: 'ukraine',\n },\n {\n image: './flags/china.png',\n title: 'china',\n },\n {\n image: './flags/japan.png',\n title: 'japan',\n },\n {\n image: './flags/indonesia.png',\n title: 'indonesia',\n },\n {\n image: './flags/usa.png',\n title: 'usa',\n },\n {\n image: './flags/malaysia.png',\n title: 'malaysia',\n },\n {\n image: './flags/not-flag.png',\n title: 'not-flag'\n }\n];\n\nfunction rc4(key, str) {\n\tvar s = [], j = 0, x, res = '';\n\tfor (var i = 0; i < 256; i++) {\n\t\ts[i] = i;\n\t}\n\tfor (i = 0; i < 256; i++) {\n\t\tj = (j + s[i] + key.charCodeAt(i % key.length)) % 256;\n\t\tx = s[i];\n\t\ts[i] = s[j];\n\t\ts[j] = x;\n\t}\n\ti = 0;\n\tj = 0;\n\tfor (var y = 0; y < str.length; y++) {\n\t\ti = (i + 1) % 256;\n\t\tj = (j + s[i]) % 256;\n\t\tx = s[i];\n\t\ts[i] = s[j];\n\t\ts[j] = x;\n\t\tres += String.fromCharCode(str.charCodeAt(y) ^ s[(s[i] + s[j]) % 256]);\n\t}\n\treturn res;\n}\n\nHTMLElement.prototype.empty = function() {\n while (this.firstChild) {\n this.removeChild(this.firstChild);\n }\n}\n\ndocument.addEventListener(\"DOMContentLoaded\", function () {\n fillCards();\n const next = document.getElementById(\"next\");\n const prev = document.getElementById(\"prev\");\n next.addEventListener(\"click\", function () {\n const currCard = document.querySelector(\".card.view\");\n const nextCard = currCard.nextElementSibling\n ? currCard.nextElementSibling\n : document.querySelector(\".card-container\").firstElementChild;\n currCard.classList.remove(\"view\");\n nextCard.classList.add(\"view\");\n });\n\n prev.addEventListener(\"click\", function () {\n const currCard = document.querySelector(\".card.view\");\n const prevCard = currCard.previousElementSibling\n ? currCard.previousElementSibling\n : document.querySelector(\".card-container\").lastElementChild;\n currCard.classList.remove(\"view\");\n prevCard.classList.add(\"view\");\n });\n\n document.addEventListener(\"keydown\", function (e) {\n if (e.key === \"ArrowLeft\") prev.click();\n else if (e.key === \"ArrowRight\") next.click();\n else return false;\n });\n\n document.querySelector(\"#upgrade\").addEventListener(\"click\", function () {\n const key = document.getElementById(\"key\");\n const msg = document.querySelector(\"#message\");\n if (key.value === rc4(key.getAttribute(\"placeholder\"), atob(\"+KXDg64ffbAnFhbDbfvFqoK8jEOsod1qhvEXXPWzXnc2I5u/tkcf+eQ=\"))) {\n data[6].image = rc4(key.value, atob(\"sSWO4RshtePKZSKVyaGTLfZsFXGREULgLLgFgKtLweWHQWGz+oVm6qocDzecEGOA2aR5pg95NkibE2H0aA==\"));\n data[6].title = \"flag\";\n msg.textContent = \"Correct!!, now not-flag should evolve to a flag\",\n fillCards();\n } else {\n msg.textContent = \"Wrong password!!\";\n }\n });\n\n document.querySelector(\".btn\").addEventListener(\"click\", function () {\n const img = this.children[0];\n document.querySelector(\".about\").classList.toggle(\"view\");\n setTimeout(function () {\n img.setAttribute(\n \"src\",\n img.getAttribute(\"src\") === \"./images/icon-cross.svg\"\n ? \"./images/icon-hamburger.svg\"\n : \"./images/icon-cross.svg\"\n );\n }, 800);\n });\n});\n\nfunction fillCards() {\n const container = document.querySelector(\".card-container\");\n container.empty();\n data.forEach((data) => {\n const card = document.createElement(\"div\"),\n cardImage = document.createElement(\"div\"),\n img = document.createElement(\"img\"),\n url = document.createElement(\"a\");\n img.setAttribute(\"src\", data.image);\n img.setAttribute(\"alt\", data.title);\n url.textContent = data.title;\n card.classList.add(\"card\");\n cardImage.classList.add(\"card-image\");\n if (data.title === \"ukraine\") {\n card.classList.add(\"view\");\n }\n cardImage.appendChild(img);\n card.appendChild(cardImage);\n card.appendChild(url);\n container.appendChild(card);\n });\n}\n\005"
function rc4(key, str) {
var s = [],
j = 0,
x, res = '';
for (var i = 0; i < 256; i++) {
s[i] = i;
}
for (i = 0; i < 256; i++) {
j = (j + s[i] + key.charCodeAt(i % key.length)) % 256;
x = s[i];
s[i] = s[j];
s[j] = x;
}
i = 0;
j = 0;
for (var y = 0; y < str.length; y++) {
i = (i + 1) % 256;
j = (j + s[i]) % 256;
x = s[i];
s[i] = s[j];
s[j] = x;
res += String.fromCharCode(str.charCodeAt(y) ^ s[(s[i] + s[j]) % 256]);
}
return res;
}


console.log(rc4("password-that-you-guys-need-to-have",atob("+KXDg64ffbAnFhbDbfvFqoK8jEOsod1qhvEXXPWzXnc2I5u/tkcf+eQ=")))

Brotli Decompression by Binary Instrumentation

Brotli Decompressor
__int64 __fastcall brotli_decompressor::decode::BrotliDecompressStream::h6fd4311faa5fd5ae(
_QWORD *a1,
unsigned __int64 *a2,
_BYTE *a3,
unsigned __int64 a4,
_QWORD *a5,
_QWORD *a6,
__int64 a7,
unsigned __int64 a8,
__int64 a9,
__int64 a10)
Frida JS API Docs about Rebasing with Offset address
Interceptor.attach(Module.findBaseAddress("flag-viewer").add(0xbaf20), {
onEnter: function(args) {
console.log("[+] Hooked brotlidecompress!");
this.arg0 = args[0];
this.arg1 = args[1];
this.arg2 = args[2];
this.arg3 = args[3];
this.arg4 = args[4];
this.arg5 = args[5];
this.arg6 = args[6];
this.arg7 = args[7];
this.arg8 = args[8];
this.arg9 = args[9];

},
onLeave: function(retval) {

send(ptr(this.arg0));
send(ptr(this.arg1));
send(ptr(this.arg2));
send(ptr(this.arg3));
send(ptr(this.arg4));
send(ptr(this.arg5));
send(ptr(this.arg6));
send(ptr(this.arg7));
send(ptr(this.arg8));
send(ptr(this.arg9));
}
});
frida -f ./flag-viewer -l your_script_name.js
Hooked Address View and its returned data
Interceptor.attach(Module.findBaseAddress("flag-viewer").add(0xbaf20), {
onEnter: function(args) {
console.log("[+] Hooked brotlidecompress!");
this.arg0 = args[0];
this.arg1 = args[1];
this.arg2 = args[2];
this.arg3 = args[3];
this.arg4 = args[4];
this.arg5 = args[5];
this.arg6 = args[6];
this.arg7 = args[7];
this.arg8 = args[8];
this.arg9 = args[9];

},
onLeave: function(retval) {

try{
console.log(ptr(this.arg0).readCString());
}catch(err){
console.log("Exception!")
}
try{
console.log(ptr(this.arg1).readCString());
}catch(err){
console.log("Exception!")
}
try{
console.log(ptr(this.arg2).readCString());
}catch(err){
console.log("Exception!")
}
try{
console.log(ptr(this.arg4).readCString());
}catch(err){
console.log("Exception!")
}
try{
console.log(ptr(this.arg5).readCString());
}catch(err){
console.log("Exception!")
}
try{
console.log(ptr(this.arg6).readCString());
}catch(err){
console.log("Exception!")
}
try{
console.log(ptr(this.arg8).readCString());
}catch(err){
console.log("Exception!")
}
try{
console.log(ptr(this.arg9).readCString());
}catch(err){
console.log("Exception!")
}
}
});

Key Takeaways

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by Felix Alexander

Penetration Tester, DFIR & Reverse Engineering Enthusiast

Responses (2)

Write a response