| 일 | 월 | 화 | 수 | 목 | 금 | 토 |
|---|---|---|---|---|---|---|
| 1 | 2 | |||||
| 3 | 4 | 5 | 6 | 7 | 8 | 9 |
| 10 | 11 | 12 | 13 | 14 | 15 | 16 |
| 17 | 18 | 19 | 20 | 21 | 22 | 23 |
| 24 | 25 | 26 | 27 | 28 | 29 | 30 |
| 31 |
- infobahn
- quickjs
- asis ctf finals
- lee seunghyun
- std::variant
- reversing
- writeup
- author is chatgpt
- typhoonpwn2025
- deayzl
- f is for flag
- pwn
- pwnable
- System Hacking
- hacking
- V8
- Wargame
- hitcon
- CTF
- Vulnerability
- gdb
- Exploit
- javascript engine
- ctf player
- ELF
- ptr-yudai
- Analysis
- xion
- asis ctf
- javascript engine exploit
- Today
- Total
목록CTF writeup/Others (4)
deayzl's blog
This challenge is one of pwn challenges from ASIS CTF Finals 2025 and I don't know why but it is the least solved one in pwn.This one is interesting because it is related to real world vulnerability that leads to rce reported by xion, Seunghyun Lee (@0x10n) but it is only that it's just modified and the root cause is changed a bit.So i put some effort to solve it and here's how i could solve it...
this is v8 exploit challenge from Infobahn CTF 2025.here are given files.Dockerfile: ASCII textPATCH.diff: unified diff output text, 1st line "diff --git a/src/builtins/builtins-array.cc b/src/builtins/builtins-array.cc", 2nd line "index 22707f30836..5ff4d7bd270 100644", 3rd line "--- a/src/builtins/builtins-array.cc", ASCII textREVISION: ASCII textargs.gn: A..
The binary consists of two functions; main and main[cold]. main:int __cdecl main(int argc, const char **argv, const char **envp){ __int64 v3; // rax char *v4; // rdi char *v5; // rdx char *v6; // rax __int64 v7; // rsi __int64 v8; // rcx signed __int64 v9; // rbx signed __int64 v10; // rax size_t v11; // rdx char *v12; // rsi __int64 v13; // rbx int v14; // ebp char v15; // cl int ..
Tool: ghidra 10.2.2 with GolangAnalyzerExtensionExploit: making utf-8 shellcode (pwnable) feat. I've never written any code in go language, so all of these are from internet references and quite a lot of my predictions.So there might be something wrong with my analysis. /* WARNING: Unknown calling convention *//* Name: main.handleConnection Start: 004cd140 End: 004cdb00 */void main.handleCon..