본문 바로가기

deayzl's blog

검색하기
deayzl's blog
프로필사진 deayzl

  • All (25)
    • About Me (1)
    • 1-day analysis (1)
      • Linux kernel (1)
      • Chromium (0)
    • CTF writeup (16)
      • HITCON CTF (2)
      • SECCON CTF (1)
      • GoN Open Qual CTF (6)
      • TyphoonCon CTF (2)
      • Codegate (1)
      • Incognito CTF (1)
      • Others (3)
    • CTF log (3)
    • wargame writeup | hint (2)
      • H4CKING GAME (0)
      • Webhacking.kr (1)
      • RootMe (1)
    • System hacking (0)
    • Cryptography (0)
    • Others (2)
Guestbook
Notice
Recent Posts
Recent Comments
Link
  • WeChall
  • RootMe
  • Dreamhack
«   2025/05   »
일 월 화 수 목 금 토
1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
Tags
  • Gon
  • deayzl
  • webhacking.kr
  • CTF
  • h4cking game
  • hacking game
  • WEB
  • crypto
  • TeamH4C
  • System Hacking
  • 해킹
  • christmas ctf
  • KAIST
  • Wreckctf
  • got overwrite
  • webhacking
  • 웹해킹
  • reversing
  • Wargame
  • python
  • 2022 Fall GoN Open Qual CTF
  • Buffer Overflow
  • dreamhack
  • pwnable
  • ctf player
  • 워게임
  • hacking
  • writeup
  • hack
  • cryptography
more
Archives
Today
Total
관리 메뉴
  • 글쓰기
  • 방명록
  • RSS
  • 관리

목록bomblab-hard (1)

deayzl's blog

[2022 Fall GoN Open Qual CTF] Bomblab - Hard writeup

undefined8 main(int param_1,undefined8 *param_2) { undefined8 uVar1; long in_FS_OFFSET; long canary; canary = *(long *)(in_FS_OFFSET + 0x28); if (param_1 == 1) { stdinaddr = stdin; } else { if (param_1 != 2) { printf("Usage: %s []\n",*param_2); /* WARNING: Subroutine does not return */ exit(8); } stdinaddr = fopen((char *)param_2[1],"r"); if (stdinaddr == (FILE *)0x0) { printf("%s: Error: Couldn..

CTF writeup/GoN Open Qual CTF 2022. 8. 31. 21:00
Prev 1 Next

Blog is powered by kakao / Designed by Tistory

티스토리툴바