| 일 | 월 | 화 | 수 | 목 | 금 | 토 |
|---|---|---|---|---|---|---|
| 1 | 2 | 3 | 4 | 5 | 6 | 7 |
| 8 | 9 | 10 | 11 | 12 | 13 | 14 |
| 15 | 16 | 17 | 18 | 19 | 20 | 21 |
| 22 | 23 | 24 | 25 | 26 | 27 | 28 |
- reversing
- seccon ctf
- Analysis
- pwnable
- quickjs
- System Hacking
- std::variant
- ELF
- hacking
- V8
- asis ctf
- writeup
- deayzl
- Vulnerability
- hitcon
- ctf player
- f is for flag
- pwn
- gdb
- Wargame
- asis ctf finals
- javascript engine
- Exploit
- typhoonpwn2025
- ptr-yudai
- lee seunghyun
- CTF
- javascript engine exploit
- infobahn
- xion
- Today
- Total
목록전체 글 (11)
deayzl's blog
This challenge is one of pwn challenges from ASIS CTF Finals 2025 and I don't know why but it is the least solved one in pwn.This one is interesting because it is related to real world vulnerability that leads to rce reported by xion, Seunghyun Lee (@0x10n) but it is only that it's just modified and the root cause is changed a bit.So i put some effort to solve it and here's how i could solve it...
this is v8 exploit challenge from Infobahn CTF 2025.here are given files.Dockerfile: ASCII textPATCH.diff: unified diff output text, 1st line "diff --git a/src/builtins/builtins-array.cc b/src/builtins/builtins-array.cc", 2nd line "index 22707f30836..5ff4d7bd270 100644", 3rd line "--- a/src/builtins/builtins-array.cc", ASCII textREVISION: ASCII textargs.gn: A..
I had only few hours to solve this and I could almost completed my exploit about 99% 1 min before ctf ends but lacked details to make it work on remote so i couldn't solve it.When I realized the problem of my exploit, I really cried hell :( 0001-Add-randompick-feat.patch:From 7fc990dae3fdac27cbff14912341116a7de5f894 Mon Sep 17 00:00:00 2001From: Pwn3r Date: Wed, 3 Sep 2025 18:21:32Subject: [PAT..
This challenge is easy but there were some mistakes so I couldn't solve it quickly.I think I need to practice taking care of details of my solve script fast.Recently, I'm even thinking of solving leetcode thanks to my poor script writing skills :( This challenge is in c++ and uses std::variant, std::_Function_base::_Base_manager, blahblahblah.The tricky point of this challenge is that it impleme..
English version of this document is in https://github.com/hyeonjun17/CVE-2022-2590-analysis GitHub - hyeonjun17/CVE-2022-2590-analysis: Dirty COW restricted to shmem in linux kernelDirty COW restricted to shmem in linux kernel. Contribute to hyeonjun17/CVE-2022-2590-analysis development by creating an account on GitHub.github.com 분석 및 테스트 버전: Linux/x86 6.0.0-rc1 (commit 37887783b3fef877bf34b899..
It was a simple challenge using clamav which parses a binary in a specific rule. https://github.com/Cisco-Talos/clamav GitHub - Cisco-Talos/clamav: ClamAV - Documentation is here: https://docs.clamav.netClamAV - Documentation is here: https://docs.clamav.net - Cisco-Talos/clamavgithub.com run.sh:#!/bin/shdocker run -v /home/ctf/clamav/:/test/ --rm -it clamav/clamav clamscan --bytecode-unsigned -..