DICECTF - HEAP Babyrop
The challenge provides a binary using libc 2.34 from DiceCTF of 2022, there is a UAF vulnerability that allows us to write arbitrarily in desired locations, abusing the behavior when them program allocates heap chunks.
The challenge provides a binary using libc 2.34 from DiceCTF of 2022, there is a UAF vulnerability that allows us to write arbitrarily in desired locations, abusing the behavior when them program allocates heap chunks.
This writeup explores an IAM role using user policies to achieve the secrets manager.
This writeup explores a vulnerable cognito service by altering the attributes of an account.
Challenge from pwnable.xyz exploring House of Spirit technique.
This writeup explains the exploration process of Confusion challenge with authentication bypass and remote code execution. The app is written in NodeJS.
This is my first Linux kernel exploit. I started studying LKM (Loadable Kernel Module) development a few months ago and now I feel comfortable starting to learn about kernel exploitation. A friend recommended the contents of LKMIDAS on kernel exploitation to me, so this is a report about my studies based on their article.
RopEmporium is a platform to learn return oriented programming and there are 8 available challenges to practice.
Notes on a railsgoat lab review, I need to finish checking other points in the code that seem to be pertinent. The purpose of doing this lab was to understand some Rails behaviors and understand how it is structured.