Disconnect3d

@disconnect3d@infosec.exchange
544 Followers
76 Following
23 Posts
Security Engineer at Trail of Bits. Pwndbg contributor, justCatTheFish CTF team captain
Bloghttps://disconnect3d.pl/
GitHubhttps://github.com/disconnect3d
Twitterhttps://twitter.com/disconnect3d_pl

We released new Pwndbg: https://github.com/pwndbg/pwndbg/releases/tag/2025.05.30 !

Among others it brings:
- New & improved kernel debugging commands (buddydump, msr, slab) and more x64 regs in context
- New command for dealing with armcm exceptions: dump-register-frame
- Disasm now shows an ✘ marker for emulated branches we know won't be taken
- Improved disasm for ARM, MIPS and LoongArch64 architectures
- Initial support for the IBM s390x architecture
- IDA sync integration fixes

And also cool portable one-liner installers:
$ curl -qsL 'https://install.pwndbg.re' | sh -s -- -t pwndbg-gdb
$ curl -qsL 'https://install.pwndbg.re' | sh -s -- -t pwndbg-lldb

Want to support us? Sponsor us at https://github.com/sponsors/pwndbg !

#pwning #gdb #ctfs #lldb #security #ctf #pwndbg

I will be giving a talk on Pwndbg open source development in ~1h on a local Python meeetup!

It will be livestreamed on: https://www.youtube.com/live/euK_S81Qnuo?si=EhZ-WhnP-4yZRElE

#ctf #gdb #pwndbg #lldb

Pykonik #76: What happens when you decide to fuckit('all')? and Open Source Dev

YouTube

Released new Pwndbg: 2025.04.18

It adds display of breakpoints in the disasm view, new libcinfo command, improves attachp & hexdump commands, UI, TUI and more. Also, command names use "-" istead of "_" now for consistency.

Read more and download it on https://github.com/pwndbg/pwndbg/releases/tag/2025.04.18 !

#pwndbg #gdb #binaryexploitation #ctf #security #tools

Release 2025.04.18 Β· pwndbg/pwndbg

This is a hotfix release for the 2025.04.13 recent release. Since we made a breaking change of renaming commands with _ to -, we added the previous command name aliases which inform about it (#2891...

GitHub

A call to memcpy() in a single binary that uses glibc may behave in 12 different ways depending on the features of the specific x86-64 CPU you run it on.

Here is a list of those impls in glibc:

https://github.com/bminor/glibc/blob/12a497c716f0a06be5946cabb8c3ec22a079771e/sysdeps/x86_64/multiarch/ifunc-impl-list.c#L1174-L1218

Fwiw this may matter a lot during binary exploitation. This was important in a challenge from PlaidCTF 2025. E.g. passing a negative (or: very huge) length allowed you to write past a buffer without a crash (the given implementation was not doing a wild copy).

#linux #binaryexploitation #ctf

We scored 1st place in the DiceCTF 2025 Quals cybersecurity competition with my team justCatTheFish 😼🐟 this weekend. We qualified for and will go to the finals in New York πŸ™‚

Full scoreboard & challenges: https://ctf.dicega.ng/scores

DiceCTF 2025 Quals

Play 🎲 DiceCTF 2025 Quals on Mar 28 to qualify for DiceCTF Finals in New York City! Solve cryptography, binary exploitation, reversing, and web challenges.

If someone read the blog post, I edited it with two additions:

1) If the randomized address is before the main thread stack, the kernel will expand the stack memory mapping when such an address is accessed. This can be seen on the screenshot below from Pwndbg πŸ™‚ and is explained more in the blog post (see "EDIT" for more info).

2) I added a "Why using the value of 65536?" section explaining why the `vm.mmap_min_addr` value is not e.g. 1.

Thx to MrQubo and Hackerspace Krakow for info & questions!

When NULL isn't null: mapping memory at 0x0 on Linux

Disconnect3d's blog.

Released Pwndbg 2025.02.19 with new commands for dumping Linux kernel nftables, initial LoongArch64 support and more!

See changelog on https://github.com/pwndbg/pwndbg/releases/tag/2025.02.19 !

#pwndbg #gdb #pwning #reverseengineering #binaryexploitation #kernel #debugging

Release 2025.02.19 Release Β· pwndbg/pwndbg

This release features commands for dumping Linux kernel nftables internals, initial support for LoongArch64 architecture, fix for GDB 16+, improved LLDB support, few commands improvements as well a...

GitHub
IT’S COMING
For ex-twits... I reported an Office RTF bug 14 years after I found it and it became CVE-2023-21716. More info at http://qoop.org/publications/cve-2023-21716-rtf-fonttbl.md and a cute tweetable PoC at https://twitter.com/jduck/status/1632471544935923712
Γ—

We scored 1st place in the DiceCTF 2025 Quals cybersecurity competition with my team justCatTheFish 😼🐟 this weekend. We qualified for and will go to the finals in New York πŸ™‚

Full scoreboard & challenges: https://ctf.dicega.ng/scores