You are here |
pwning.net | ||
| | | |
tcode2k16.github.io
|
|
| | | | a random blog about cybersecurity and programming | |
| | | |
wachter-space.de
|
|
| | | | This is a writeup of an easy/medium pwn challenge called "Profile" featuring a type confusion, some GOT overwriting, and a funny but unnecessary one gadget exploit for the fun of it. We are given the following files: main.c profile (binary) Dockerfile docker-compose.yml Let's look at main.c and see if we can spot a vulnerability from the provided source code. #include #include #include #include struct person_t { int id; int age; char *name; }; void get_value(const char *msg, void *pval) { printf("%s", ms... | |
| | | |
karmanyaah.malhotra.cc
|
|
| | | | ||
| | | |
securityinaction.wordpress.com
|
|
| | ==================== TL; DR With the recent publication of post quantum cryptography (PQC) algorithms from NIST, organisations of all size should begin the transition to PQC. Please refer to this PQC readiness publication from CISA as a starting point. ==================== To assist with the transition to PQC, I have provided advice below for government agencies and... |