- yoyoyoyo
- yoyo
- yo
- My first time firefox js exploit
- Not a intended way, but I was fast (first blood)
- Lua arbitrary heap pointer write (?)
- My first time lua exploit
- Also First Blood :) (Team: STLCTF)
- SQLite3 extension reversing
- ROP with bit flipping attack
- Cryptographic logic was identified by bindiff
- you can get server binary using:
curl --path-as-is http://[SERVER]/docs/../../../../../../../proc/self/exe - and you need to reverse-engineering the function
Service::checkFlag - I used binary ninja for automation and it was quite easy for me.
- download binary and do:
base64.b64decode(gzip.decompress(binary)) - find randomly generated constraint function and other informations. (I know that there are many ways to handle this.) 2.1. I did it with binaryninja.
- solve constraints by emulation, symbolic execution, dynamic binary instrumentation, or anything you want. 3.1. I did it with unicorn engine.
- finally, you can reach fsb and bof.
- done!
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import sys | |
| import json | |
| import requests | |
| import shutil | |
| from pathlib import Path | |
| from zipfile import ZipFile | |
| API = 'https://samate.nist.gov/SARD/api/test-cases/search?flaw%5B%5D={cwe}&language%5B%5D=c&page={page}&limit={limit}' | |
| DOWNLOADS=(Path(__file__).parent / 'downloads') |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!python3 | |
| import angr | |
| import networkx | |
| from pathlib import Path | |
| def main(args): | |
| p = angr.Project(args.binary, load_options={ |
OlderNewer