|
You are here |
pwning.net | ||
| | | | |
karmanyaah.malhotra.cc
|
|
| | | | | [AI summary] This article provides a technical writeup of the author's solutions to several advanced binary exploitation (pwn) challenges during the BCACTF 2022 CTF competition. | |
| | | | |
www.da.vidbuchanan.co.uk
|
|
| | | | | ||
| | | | |
wachter-space.de
|
|
| | | | | This is a writeup of an easy/medium pwn challenge called "Profile" featuring a type confusion, some GOT overwriting, and a funny but unnecessary one gadget exploit for the fun of it. We are given the following files: main.c profile (binary) Dockerfile docker-compose.yml Let's look at main.c and see if we can spot a vulnerability from the provided source code. #include #include #include #include struct person_t { int id; int age; char *name; }; void get_value(const char *msg, void *pval) { printf("%s", ms... | |
| | | | |
kuterdinel.com
|
|
| | | I demonstrate how you can write a simple JIT (Just In Time) compiler for x86 in about 1000 lines of C code. | ||