Explore >> Select a destination


You are here

cardaci.xyz
| | blog.nelhage.com
3.1 parsecs away

Travel
| | CVE-2007-4573 is two years old at this point, but it remains one of my favorite vulnerabilities. It was a local privilege-escalation vulnerability on all x86_64 kernels prior to v2.6.22.7. It's very simple to understand with a little bit of background, and the exploit is super-simple, but it's still more interesting than Yet Another NULL Pointer Dereference. Plus, it was the first kernel bug I wrote an exploit for, which was fun.
| | healeycodes.com
3.7 parsecs away

Travel
| | Using ptrace to intercept and modify a process's getrandom syscall.
| | intrigus.org
4.6 parsecs away

Travel
| | How to reverse engineer a Mach-O binary from BraekerCTF 2024 that breaks all tools.
| | blog.nuculabs.dev
13.7 parsecs away

Travel
| Hello, In this article I'll present you my solution on the Chapter 5 CTF from the book Practical Binary Analysis. For this binary, the hint is to fix four broken things. Running file gives us the following response: 1 2 binary@binary-VirtualBox:~/ctf$ file ./lvl3 ./lvl3: ERROR: ELF 64-bit LSB executable, Motorola Coldfire, version 1 (Novell Modesto) error reading (Invalid argument) And the readelf command gives us: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 binary@binary-VirtualBox:~/ctf$ readelf -h ./lvl3 ELF Header: Magic: 7f 45 4c 46 02 01 01 0b 00 00 00 00 00 00 00 00 Class: ELF64 Data: 2's complement, little endian Version: 1 (current) OS/ABI: Novell - Modesto ABI Version: 0 Type: EXEC (Executable file) Machine: Motorola Coldfire Version: ...