SidHawks
The personal journal

DICECTF - HEAP Babyrop

The challenge provides a binary using libc 2.34 from DiceCTF of 2022, there is a UAF vulnerability that allows us to write arbitrarily in desired locations, abusing the behavior when them program allocates heap chunks.

Read more

IAM Privesc By Key Rotation

This writeup explores an IAM role using user policies to achieve the secrets manager.

Read more

Vulnerable Cognito

This writeup explores a vulnerable cognito service by altering the attributes of an account.

Read more

PWNABLE XYZ - FreeSpirit

Challenge from pwnable.xyz exploring House of Spirit technique.

Read more

GENESIS CTF 2024 - Confusion

This writeup explains the exploration process of Confusion challenge with authentication bypass and remote code execution. The app is written in NodeJS.

Read more

Linux Kernel Exploitation[1] - Study Case

This is my first Linux kernel exploit. I started studying LKM (Loadable Kernel Module) development a few months ago and now I feel comfortable starting to learn about kernel exploitation. A friend recommended the contents of LKMIDAS on kernel exploitation to me, so this is a report about my studies based on their article.

Read more

RopEmporium

RopEmporium is a platform to learn return oriented programming and there are 8 available challenges to practice.

my solutions

other challs

RailsGoat Lab

Notes on a railsgoat lab review, I need to finish checking other points in the code that seem to be pertinent. The purpose of doing this lab was to understand some Rails behaviors and understand how it is structured.

Read more