본문 바로가기

deayzl's blog

검색하기
deayzl's blog
프로필사진 deayzl

  • All (11)
    • About Me (1)
    • 1-day analysis (1)
      • Linux kernel (1)
      • Chromium (0)
    • CTF writeup (8)
      • HITCON CTF (2)
      • SECCON CTF (1)
      • GoN Open Qual CTF (0)
      • TyphoonCon CTF (0)
      • Codegate (0)
      • Incognito CTF (0)
      • Others (4)
    • CTF log (0)
    • wargame writeup | hint (0)
      • H4CKING GAME (0)
      • Webhacking.kr (0)
      • RootMe (0)
    • System hacking (0)
    • Cryptography (0)
    • Others (1)
Guestbook
Notice
Recent Posts
Recent Comments
Link
  • WeChall
  • RootMe
  • Dreamhack
«   2026/02   »
일 월 화 수 목 금 토
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
Tags
  • javascript engine exploit
  • ptr-yudai
  • lee seunghyun
  • xion
  • asis ctf
  • reversing
  • javascript engine
  • pwnable
  • ELF
  • V8
  • writeup
  • Vulnerability
  • deayzl
  • infobahn
  • gdb
  • Exploit
  • typhoonpwn2025
  • System Hacking
  • CTF
  • hitcon
  • pwn
  • ctf player
  • Analysis
  • f is for flag
  • hacking
  • quickjs
  • asis ctf finals
  • seccon ctf
  • std::variant
  • Wargame
more
Archives
Today
Total
관리 메뉴
  • 글쓰기
  • 방명록
  • RSS
  • 관리

목록quickjs (1)

deayzl's blog

[ASIS CTF 2025 Quals/PWN/QuickJS] RandomJS

I had only few hours to solve this and I could almost completed my exploit about 99% 1 min before ctf ends but lacked details to make it work on remote so i couldn't solve it.When I realized the problem of my exploit, I really cried hell :( 0001-Add-randompick-feat.patch:From 7fc990dae3fdac27cbff14912341116a7de5f894 Mon Sep 17 00:00:00 2001From: Pwn3r Date: Wed, 3 Sep 2025 18:21:32Subject: [PAT..

CTF writeup 2025. 9. 8. 11:07
Prev 1 Next

Blog is powered by kakao / Designed by Tistory

티스토리툴바