Abusing Sigreturn oriented programming (SROP)April 16, 2022 In this article, i’ll explain and teach how to approach a pwn challenge when you can write many bytes to stack and no gadgets are available. Void from tamuctf was a classic and refreshing SROP binary-exploitation challenge, had fun solving it! read more
Pwning binaries and defeating modern mitigations using rop and ret2libc (foobar 2022 pwn writeup)March 06, 2022 In this article, i’ll explain and teach how to approach these kind of challenges, and how to defeat Stack canaries, ASLR, NX and PIE. Warmup pwn was a nice warm-up binary exploitation challenge from foobar ctf 2022, had fun solving it! read more
Proxies, SSRF and beyond! (TSJ CTF 2022 nimja writeup)March 01, 2022 At the end of February this year, TSJ CTF 2022 was released with many interesting challenges including Web and Binary Exploits, RE, Crypto and Misc! Our team had fun solving this challenge as it was interesting and unique. read more