

GitHub - saelo/35c3ctf: Source code and exploits for some 35c3ctf challenges.
source link: https://github.com/saelo/35c3ctf
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

README.md
35c3ctf
Source code, binaries, and example exploits for the 35c3ctf challenges "WebKid", "pillow", and "chaingineering".
WebKid
A modified WebKit with a new optimization which breaks some invariants of the JavaScript engine. Exploiting these will result in shellcode execution inside the WebContent sandbox. The sandbox was modified to allow read access to /flag1 and IPC lookup of the "pillow" services.
Pillow
Two custom macOS system services. The challenge was inspired by https://github.com/bazad/blanket and allows one to hijack the IPC connection between the two services to finally run arbitrary code outside of the sandbox. The challenge was hosted on a seperate VM and one could read /flag3 once outside of the sandbox.
Chaingineering
The combination of the previous two challenges. One has to combine the WebKit and sandbox escape exploit into a single chain, then read /flag2 from outside the sandbox on the WebKid VM.
Recommend
-
91
Preventing Remote Code Execution Exploits in Java by Shawn McKinney | Sep 26, 2017 |
-
180
windows-kernel-exploits windows-kernel-exploits #Security Bulletin #KB #Description #Operating System CVE-2021-33739 [...
-
165
linux-kernel-exploits linux-kernel-exploits #CVE #Description #Kernels CVE–2018–18955...
-
128
Files Permalink Latest commit message...
-
130
CVE-2017-11882 CVE-2017-11882: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11882 MITRE...
-
80
README.md VirtualBox 3D PoCs & exploits Author: @_niklasb
-
57
README.md 35c3ctf
-
81
-
110
README.md 35C3 Junior CTF pwnables Source code and exploits for the 35C3 Junior CTF pwnables. To recreate the CTF environment with docker enter...
-
4
pillow,是 35c3ctf 中的一道关于 macOS bootstrap Service 沙箱逃逸题目。本人将通过学习这一题来进一步了解Mac OSX XPC 和 Sandbox 机制。 该题中包含了两个自定义 macOS 系统服务。要求攻击者劫持两个 XPC 服务之间...
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK