TBTL CTF 2024 Challenge Writeups 4x Web 5x Pwn

Ғылым және технология

00:00 Intro
00:34 web/butterfly
02:30 web/talk-to-you
03:20 web/rnd-for-data-science
08:00 web/mexico-city-tour
13:15 pwn/enough-with-the-averages
16:32 pwn/a-day-at-the-races
21:08 pwn/diamonds-and-rust
23:38 pwn/heap-peek-and-poke
36:15 pwn/squeezing-tightly-on-arm
39:37 Outro

Пікірлер: 14

  • @failcharger
    @failcharger19 күн бұрын

    My guy you have some of the best writeups. Every CTF I wait for your vid to drop

  • @SloppyJoePirates

    @SloppyJoePirates

    19 күн бұрын

    Ha thanks! Glad you like them!

  • @markuche1337
    @markuche133718 күн бұрын

    Awesome 😁

  • @daniel01045
    @daniel0104519 күн бұрын

    For enough-with-the-averages I tried solving it with passing 'a' as the invalid input but thought it's impossible to calculate this way, but then my friend solved it with 'a' so... very cool to learn that a plus sign counts as invalid input but also flushes the buffer :)

  • @shunt7819
    @shunt781919 күн бұрын

    Nice writeup!! I had tcache poisoning in mind but 23:38 I solved it by overwriting a vtable ptr in bss. Got arb read by overwriting the ptr at 0xf0 after the string, but arb write was limited to bss and heap in my case didn't wanted to do it heap way cause I didn't have a proper pwndbg setup lol.

  • @danielfoudeh5915
    @danielfoudeh591519 күн бұрын

    Quality stuff, keep it up!

  • @TodiDiang
    @TodiDiang19 күн бұрын

    15:30 why use + for bypassing the scanf()? How that's work? Do you have any useful docs about that?

  • @SloppyJoePirates

    @SloppyJoePirates

    19 күн бұрын

    Hey @TodiDiang! We just need a character that doesn't match "%d" (integer), so that scanf doesn't change the underlying memory address (&score[i]). But we also want it to "eat" the character from the input buffer, and scanf "eats" the '+' symbol (I'd guess because '+1' would be valid input). If you use an 'a' or something, I believe the 'a' stays on the input buffer, and so all the scanf's quickly fail in succession because each one eats nothing, fails, then goes to the next round which also fails and eats nothing. My understanding could be off, I don't have any resources on the topic, just what I've seen from playing.

  • @_2xfree

    @_2xfree

    19 күн бұрын

    @@SloppyJoePirates "But we also want it to "eat" the character from the input buffer", yeah that is what I spent a lot of time on haha, I was doing a with 'a' for a long time and was then trying to calculate each value on the stack based on the values that came after it, which was mathematically correct but infeasible because of floating point imprecision in practice, then I used '-' instead of ''a' and it worked like magic.

  • @r3plican
    @r3plican19 күн бұрын

    when u continue the series about pwn?

  • @SloppyJoePirates

    @SloppyJoePirates

    16 күн бұрын

    Hey @r3plican, I won't be continuing CTF Cookbook. But the next Security Topics video series will contain some pwn videos!

  • @Xeno881
    @Xeno88119 күн бұрын

    Format String Vulnerability in pwn,can you teach?

  • @SloppyJoePirates

    @SloppyJoePirates

    16 күн бұрын

    I'd recommend checking out pwn.college, they have some videos and a set of challenges to practice with!

Келесі