Skip to main content
Pranav Krishna

Pranav Krishna

Aspiring Exploit Developer

Recent

v8 - ArrayShift Race Condition
·1233 words·6 mins
Browser V8

In this post, we’ll explore how to exploit a race condition in the V8 JavaScript engine, leading to a dangling pointer and a Use-After-Free (UAF) vulnerability.

CVE-2024-0517 Quick Blog
·1198 words·6 mins
Browser V8

This post explores a vulnerability found in the Maglev optimizing compiler of V8, specifically within a function responsible for optimizing classes that inherit from a parent class.

expm1-35C3 - Bug/ Optimizations Analysis
·1700 words·8 mins
Math.expm1 Typer OOB

In this post, we’ll dive deep into a fascinating bug in the V8 JavaScript engine that arises from the mishandling of the Math.expm1(-0) function during the optimization process.

Tallocator [bi0sCTF 2024]
·2401 words·12 mins
Bi0sctf Android Reverse_Shell

I created an Android based pwn challenge that involes exploiting a dynamic memory allocator using the webview interface.

evalbox - pyjail writeup
·871 words·5 mins
Pyjail Pwn Ptr-Yudai

This was a particularly unique and well-designed PyJail challenge featured in the Asian Cyber Security Challenge. Although I solved it during the contest using an unintended method, I later came across a writeup by ptr-yudai (an incredible pwner, someone I really aspire to be like!). Below are the notes I made while going through his insightful writeup.

babyROP [DiceGang CTF]
·695 words·4 mins
Csu Ret2csu Dicegang

This is a basic ROP Challenge that involves a technique called the ret2csu. We use this when there is a lack of gadgets.