| 일 | 월 | 화 | 수 | 목 | 금 | 토 |
|---|---|---|---|---|---|---|
| 1 | 2 | 3 | 4 | 5 | 6 | 7 |
| 8 | 9 | 10 | 11 | 12 | 13 | 14 |
| 15 | 16 | 17 | 18 | 19 | 20 | 21 |
| 22 | 23 | 24 | 25 | 26 | 27 | 28 |
- pwn
- Analysis
- lee seunghyun
- deayzl
- quickjs
- Wargame
- javascript engine exploit
- infobahn
- pwnable
- ELF
- typhoonpwn2025
- javascript engine
- CTF
- reversing
- Exploit
- f is for flag
- ctf player
- gdb
- std::variant
- asis ctf finals
- Vulnerability
- xion
- writeup
- seccon ctf
- V8
- ptr-yudai
- asis ctf
- System Hacking
- hitcon
- hacking
- Today
- Total
목록V8 (2)
deayzl's blog
This challenge is one of pwn challenges from ASIS CTF Finals 2025 and I don't know why but it is the least solved one in pwn.This one is interesting because it is related to real world vulnerability that leads to rce reported by xion, Seunghyun Lee (@0x10n) but it is only that it's just modified and the root cause is changed a bit.So i put some effort to solve it and here's how i could solve it...
this is v8 exploit challenge from Infobahn CTF 2025.here are given files.Dockerfile: ASCII textPATCH.diff: unified diff output text, 1st line "diff --git a/src/builtins/builtins-array.cc b/src/builtins/builtins-array.cc", 2nd line "index 22707f30836..5ff4d7bd270 100644", 3rd line "--- a/src/builtins/builtins-array.cc", ASCII textREVISION: ASCII textargs.gn: A..