House of Cat: New GLIBC IO Exploitation Techniques

House of Cat: New GLIBC IO Exploitation Techniques

This article is a highlight from the Kanxue Forum Author ID on Kanxue Forum: CatF1y House of Cat A new method of exploiting IO in GLIBC discovered in May, applicable to any version (including glibc2.35), named House of Cat and presented in the 2022 Strong Network Cup. Introduction House of Emma is one of the … Read more

Sharing Ideas on Strong Network Cup S8 Rust Pwn Chat-With-Me Problem

Sharing Ideas on Strong Network Cup S8 Rust Pwn Chat-With-Me Problem

1 Problem-Solving Ideas The final number of solutions for this problem is 42, as the difficulty level is not high and generally meets expectations. The problem is coded in Rust, and it was decided to remove symbols without providing the source code the night before the competition. This not only made it very difficult for … Read more

Reversing and Exploiting Embedded Devices: Software Stack Part 1

Reversing and Exploiting Embedded Devices: Software Stack Part 1

Translated from https://www.praetorian.com/blog/reversing-and-exploiting-embedded-devices-part-1-the-software-stack Author Elvis Collado Posted Thursday, June 02, 2016, 11:17 AM CDT by In the past few months, I have been traveling to guide people on how to exploit vulnerabilities in embedded devices. Just slides are not sufficient to convey enough information, so I have written everything down for better knowledge digestion. The … Read more