I hereby claim:
- I am itayc0hen on github.
- I am itayco (https://keybase.io/itayco) on keybase.
- I have a public key ASBnlwO1IQCawArAMZOPwqjVm9oYJWYpEqEVOAofvkjl1wo
To claim this, I am signing this object:
| /* | |
| Slackware Linux 1.01 "lpr" stack overflow privilege escalation | |
| Usage: | |
| slack:/tmp$ gcc prdelka-vs-GNU-lpr.c -o prdelka-vs-GNU-lpr | |
| slack:/tmp$ ./prdelka-vs-GNU-lpr | |
| Written by: prdelka | |
| */ | |
| #include <stdio.h> |
| # Full Writeup: https://www.megabeets.net/pragyan-ctf-new-avenger | |
| from zipfile import ZipFile | |
| import string | |
| passwords =[] | |
| i = 1 | |
| while True: | |
| f=reversed(open("%s_image.jpg"%i).readlines()) |
I hereby claim:
To claim this, I am signing this object:
| #include <Windows.h> | |
| #include <stdio.h> | |
| #include <stdlib.h> | |
| #pragma warning(disable: 4996)# define MAX_PATH_LEN 2048# define MAX_BUFF_LEN 2048# define IPM_BUFFER_LEN(0x800) | |
| typedef struct _pipedata { | |
| unsigned int opcode; | |
| unsigned int length; | |
| char data[IPM_BUFFER_LEN]; |
| using System.Net; | |
| using System.Runtime.InteropServices; | |
| [DllImport("YOUR_DLL_NAME")] | |
| public static extern void load(); | |
| public static async Task<HttpResponseMessage> Run(HttpRequestMessage req, TraceWriter log) | |
| { | |
| load(); | |
| log.Info("C# HTTP trigger function processed a request."); | |
| return req.CreateResponse(HttpStatusCode.OK, "Malicious Function"); | |
| } |