본문 바로가기

deayzl's blog

검색하기
deayzl's blog
프로필사진 deayzl

  • All (25)
    • About Me (1)
    • 1-day analysis (1)
      • Linux kernel (1)
      • Chromium (0)
    • CTF writeup (16)
      • HITCON CTF (2)
      • SECCON CTF (1)
      • GoN Open Qual CTF (6)
      • TyphoonCon CTF (2)
      • Codegate (1)
      • Incognito CTF (1)
      • Others (3)
    • CTF log (3)
    • wargame writeup | hint (2)
      • H4CKING GAME (0)
      • Webhacking.kr (1)
      • RootMe (1)
    • System hacking (0)
    • Cryptography (0)
    • Others (2)
Guestbook
Notice
Recent Posts
Recent Comments
Link
  • WeChall
  • RootMe
  • Dreamhack
«   2025/05   »
일 월 화 수 목 금 토
1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
Tags
  • h4cking game
  • deayzl
  • CTF
  • Gon
  • KAIST
  • crypto
  • cryptography
  • christmas ctf
  • pwnable
  • WEB
  • 해킹
  • webhacking.kr
  • TeamH4C
  • System Hacking
  • ctf player
  • Wargame
  • python
  • Wreckctf
  • reversing
  • hack
  • hacking
  • 워게임
  • hacking game
  • Buffer Overflow
  • webhacking
  • writeup
  • got overwrite
  • 웹해킹
  • dreamhack
  • 2022 Fall GoN Open Qual CTF
more
Archives
Today
Total
관리 메뉴
  • 글쓰기
  • 방명록
  • RSS
  • 관리

목록Golang (1)

deayzl's blog

[2023 UMDCTF] You Want Me To Run What?? writeup (unintended)

Tool: ghidra 10.2.2 with GolangAnalyzerExtension Exploit: making utf-8 shellcode (pwnable) feat. I've never written any code in go language, so all of these are from internet references and quite a lot of my predictions. So there might be something wrong with my analysis. /* WARNING: Unknown calling convention */ /* Name: main.handleConnection Start: 004cd140 End: 004cdb00 */ void main.handleCon..

CTF writeup/Others 2023. 5. 1. 12:00
Prev 1 Next

Blog is powered by kakao / Designed by Tistory

티스토리툴바