W3ndige Student Just a student with passion for security. Interested in operating systems, reverse engineering and how things work at low level.

BsidesSF CTF 2019 - svgmagick

Another challenge that I’ve missed during the CTF was the scgmagick challenge rated for 100 points. Solution is very esay, but required some trial and error. Let’s take a look.

ROP Emporium - ret2csu

Last task from the Rop Emporium challenges and the last post. Today we’re going to explore something called Universal Gadget, that will allow us to use three parameters to functions calls, when we do not have any useful gadgets available to us.

BsidesSF CTF 2019 - sequel

BsidesSF was a great CTF, but as I could not finish many tasks withing the duration of the competition, I decided to come back to the ones with which I struggled the most. Here’s my write up for sequel, which is cool web challenge rated 200 points.

ROP Emporium - pivot

In this challenge from ROP Emporium, our stack space is quite limited and we have to find a way to pivot the payload somewhere else in the binary. Our goal is to call ret2win function, which is located in libpivot.so shared object.

Vulnhub.com - WebDeveloper: 1

Today we’re going to do another machine from Vulnhub called WebDeveloper: 1. Once again we have to get the flag from /root/flag.txt directory. Easy machine with mostly generic types of exploitation, but still had a lot of fun with it.

© 2016 - 2019 Root Network Security. Made with