tl;dr
- Decoding the strings found in TCP stream 0.
- Analysing and extracting data sent via different ports of TCP.
- Using character-wise caesar from the extracted data.
- Zip cracking
tl;dr
Intended solution of PRetty stroNG challenge from InCTF Internationals 2019
tl;dr
Intended solution of Wannavmbe challenge from InCTF Internationals 2019
tl;dr
Intended solution of waRSAw challenge from InCTF Internationals 2019
tl;dr variant of LSB Oracle Attack on unpadded RSA
tl;dr
tl;dr
tl;dr
Solved by: stuxn3t
tl;dr
Array.pop
. Uint32Array
and a Uint8Array
to get a overflow in an ArrayBuffer
and proceed to convert this to arbitrary read-write and execute shellcode.tl;dr
This post will describe how I exploited CVE-2019-14378, which is a pointer miscalculation in network backend of QEMU. The bug is triggered when large IPv4 fragmented packets are reassembled for processing. It was found by code auditing.
tl;dr