After my tutorial on seccomp, thanks for Google CTF for providing such good challenges to learn something new about seccomp escape. Since I was unable to play in Google CTF in time. I think it is necessary to record the challenges.
This post will give the write-up for the execve-sandbox in GoogleCTF. And my write-up is based on  and . Continue reading “GoogleCTF 2018 Qual PWN EXECVE-Sandbox Write-up”
It is not me that solve the challenge during the competition. Just take it as a warm-up for coming CTF. Continue reading “CrossCTF 2018 Qual RE GOGOGO”
This paper was published in Oakland 2014. In this paper, the author presents a generic way to exploit proprietary server even if the source code and the binary code is not available but a crash is found through remote fuzzing test.
Continue reading “Hacking Blind”
The virtual table is the key factor that achieves polymorphism in C++. This post will talk about the virtual table and its structure in C++. More particularly, I will introduce the virtual functions under Linux and Windows. All tests are done on 64-bit platform. 32-bit platform is a little bit different but the basic idea is similar.
Continue reading “Virtual Function”