Recent
DCTF - 2021
·4898 words·23 mins
I played this CTF event with the WeakButLeet team and in the end, we managed to get 18th rank, sadly we couldn’t do much crypto challenges but overall it was a fun CTF to get refreshed, there were other CTFs running as well but I only played this as there was a local CTF going on.
HackTheBox Pwn: Hunting
·1660 words·8 mins
This challenge was quite good, as someone who never really did egghunting shellcode, this was a good learning experience. So, the binary given s pretty simple, all the protections have been disabled except the PIE but, analysing the workflow, we can see that it reads shellcode and then execute that shellcode.
HackTheBox Pwn: Toxin
·1240 words·6 mins
This challenge on the HackTheBox was released recently, the archive attachment contains the following files:
toxin: The binary ld-2.27.so and the libc-2.
Overlapping Chunks: GLIBC 2.27 Heap Exploitation
·4605 words·22 mins
This is going to be an in-depth explaination of the overlapping chunks techniques on GLIBC 2.27, this technique can also be produced on the GLIBC 2.
HTB: RopeTwo Writeup
·10948 words·52 mins
This box was without a second thought one of the favourite box of mine on HackTheBox so far, since I am more of a pwn and reverse engineering person, this machine was a challenge, an outstanding one which pushed my learning skills more further because upto the moment I really went into this, I was not a good at heap exploitation, more skeptical about the V8 exploitation skills of mine and of course I knew nothing of the kernel pwn, so this was a way to tackle every weakness of mine, hope you find the writeup useful, I’ll include the link of the attachments at the very bottom to my files, QEMU enviornment for the kernel pwn and the exploits, without further ado, let’s start.