본문 바로가기

deayzl's blog

검색하기
deayzl's blog
프로필사진 deayzl

  • All (11)
    • About Me (1)
    • 1-day analysis (1)
      • Linux kernel (1)
      • Chromium (0)
    • CTF writeup (8)
      • HITCON CTF (2)
      • SECCON CTF (1)
      • GoN Open Qual CTF (0)
      • TyphoonCon CTF (0)
      • Codegate (0)
      • Incognito CTF (0)
      • Others (4)
    • CTF log (0)
    • wargame writeup | hint (0)
      • H4CKING GAME (0)
      • Webhacking.kr (0)
      • RootMe (0)
    • System hacking (0)
    • Cryptography (0)
    • Others (1)
Guestbook
Notice
Recent Posts
Recent Comments
Link
  • WeChall
  • RootMe
  • Dreamhack
«   2026/02   »
일 월 화 수 목 금 토
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
Tags
  • hacking
  • xion
  • CTF
  • asis ctf finals
  • gdb
  • hitcon
  • reversing
  • javascript engine
  • seccon ctf
  • ctf player
  • Exploit
  • Vulnerability
  • pwnable
  • V8
  • typhoonpwn2025
  • pwn
  • writeup
  • System Hacking
  • f is for flag
  • ELF
  • lee seunghyun
  • deayzl
  • asis ctf
  • std::variant
  • quickjs
  • Wargame
  • Analysis
  • javascript engine exploit
  • infobahn
  • ptr-yudai
more
Archives
Today
Total
관리 메뉴
  • 글쓰기
  • 방명록
  • RSS
  • 관리

목록javascript engine (1)

deayzl's blog

[Infobahn CTF 2025/PWN/V8] The Butterfly effect

this is v8 exploit challenge from Infobahn CTF 2025.here are given files.Dockerfile: ASCII textPATCH.diff: unified diff output text, 1st line "diff --git a/src/builtins/builtins-array.cc b/src/builtins/builtins-array.cc", 2nd line "index 22707f30836..5ff4d7bd270 100644", 3rd line "--- a/src/builtins/builtins-array.cc", ASCII textREVISION: ASCII textargs.gn: A..

CTF writeup/Others 2025. 11. 10. 12:55
Prev 1 Next

Blog is powered by kakao / Designed by Tistory

티스토리툴바