<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Pwn on Tyler's Blog</title><link>https://blog.zars.me/tags/pwn/</link><description>Recent content in Pwn on Tyler's Blog</description><generator>Hugo</generator><language>en-us</language><copyright>© Athul</copyright><lastBuildDate>Sat, 27 Apr 2024 12:13:32 +0530</lastBuildDate><atom:link href="https://blog.zars.me/tags/pwn/index.xml" rel="self" type="application/rss+xml"/><item><title>hitb-gsec-2017 babyqemu</title><link>https://blog.zars.me/posts/hitb-gsec-2017/</link><pubDate>Sat, 27 Apr 2024 12:13:32 +0530</pubDate><guid>https://blog.zars.me/posts/hitb-gsec-2017/</guid><description>This was an old challenge, but one of my friends was teaching to it and I knew nothing about QEMU and physical hardware. I went into it know it was a QEMU escape so I won&amp;rsquo;t be covering the mindset of finding that out but I&amp;rsquo;ll break down the indepth meaning behind what the exploit does and some of the QEMU internals that make this problem solvable.
The Problem The provided resources for the challenge allude to it being a QEMU challenge:</description></item><item><title>nahamctf 2023</title><link>https://blog.zars.me/posts/nahamctf2023/</link><pubDate>Sat, 17 Jun 2023 12:13:32 +0530</pubDate><guid>https://blog.zars.me/posts/nahamctf2023/</guid><description>I keep having busy weekends and I wish I had a touch more time to grind out the challenges I had left for this CTF. Awesome challenges by the authors! Thanks for the fun CTF nahamsec team!
Glasses 50 points - Warmups - 955 Solves - easy Author: @JohnHammond#6971 Everything is blurry, I think I need glasses! We can&amp;rsquo;t inspect element with a mouseclick. No worries, just use the keyboard shortcut (or on Mac the menu still pops).</description></item><item><title>HeroCTF V5</title><link>https://blog.zars.me/posts/heroctfv5/</link><pubDate>Mon, 15 May 2023 12:13:32 +0530</pubDate><guid>https://blog.zars.me/posts/heroctfv5/</guid><description>Overview HeroCTF was my first solo team attempt at CTF&amp;rsquo;ing. It was a blast and huge props to the authors of the challenges. I had fun solving all the ones I did and had plenty of time to experiment with the ones I couldn&amp;rsquo;t. The CTF was hosted here: link. I&amp;rsquo;ll break down my solves below in no particular order.
dev.corp 1/4 The famous company dev.corp was hack last week.. They don&amp;#39;t understand because they have followed the security standards to avoid this kind of situation.</description></item><item><title>irisCTF babyseek</title><link>https://blog.zars.me/posts/irisctf-babyseek/</link><pubDate>Wed, 01 Feb 2023 12:13:32 +0530</pubDate><guid>https://blog.zars.me/posts/irisctf-babyseek/</guid><description>The Challenge I&amp;rsquo;ll let you seek around my file as far as you want, but you can&amp;rsquo;t go anywhere since it&amp;rsquo;s /dev/null.
Author: sera
seek.zip
nc seek.chal.irisc.tf 10004
The Provided ZIP chal Provided binary chal.c Source which binary comes from Makefile Provided compilation flags Dockerfile Dockerfile running on the server Protections [*] &amp;#39;/root/workspace/vr_pres2/seek/chal&amp;#39; Arch: amd64-64-little RELRO: No RELRO Stack: No canary found NX: NX enabled PIE: PIE enabled Welp, if we can overflow and overwrite the GOT, seems like we&amp;rsquo;re in the home stretch.</description></item><item><title>irisCTF ret2libm</title><link>https://blog.zars.me/posts/irisctf-ret2libm/</link><pubDate>Wed, 01 Feb 2023 12:13:32 +0530</pubDate><guid>https://blog.zars.me/posts/irisctf-ret2libm/</guid><description>The Challenge I need to make a pwn? Let&amp;rsquo;s go with that standard warmup rop thing&amp;hellip; what was it&amp;hellip; ret2libm?
Author: sera
ret2libm.zip / Dockerfile
The Provided ZIP chal Provided binary chal.c Source which binary comes from libc-2.27.so Provided libc version libm-2.27.so Provided libm version Makefile Provided compilation flags What is libm? #include &amp;lt;math.h&amp;gt; libm is the standard math library for C. Where does libm live? $ ldd chal linux-vdso.so.1 (0x00007fffd53f5000) libm.</description></item></channel></rss>