This is my current area of research. I look mostly into v8, which is chrome browser’s Javascript Engine. This contains cves and related topic.
Expert - Browser Exploitation
Training
Pwn
Related
evalbox - pyjail writeup
·871 words·5 mins
Pyjail
Pwn
Ptr-Yudai
This was a particularly unique and well-designed PyJail challenge featured in the Asian Cyber Security Challenge. Although I solved it during the contest using an unintended method.
Leaky Pipes [inCTFj Quals]
·1013 words·5 mins
Pwn
Format String
Played InCTFj Quals this winter vacation. It was a fun filled ctf. Here we will discuss the pwn challenge called leaky pipes. Make sure to give the challenge a try before seeing this.
Global Offset Table and Procedure Linkage Table
·503 words·3 mins
Short-Blog
Pwn
GOT
How do programs know where the libc functions are in the libc, How is the internal implementation of the same ? We will look into GOT and PLT in short in this one.