Профиль
Оценка
CTF all the day
Статистика
Контактная информация

kallsyms kallsyms en

 104319

Разместить

 130

Баллы

 7

Задачи и проблемы

 0

Компромиссы

Мои данные

  • Статус : Посетитель
  • Количество должностей : 0
  • ЧатБокс : 0
  • Биография :

    Unlinked unsorted bins via double-free, exfiltrated arbitrary data with heap grooming. Forced malloc consolidation through fragmentation. Overflowed stack cookies, leaked libc base via printf. Hijacked syscall table, injected ROP chains through KASLR mitigation. Cracked kernel SMEP, smacked SMAP, remapped page tables in runtime. Took control of process credentials using double-fetch on a remote kernel module. Dumped full process memory with no ptrace restrictions. Decrypted AES via ECB oracle, decrypted RSA private key using fault injection. Weaponized SIGSEGV into user-controlled heap pivoting. Arbitrary execution using JIT spraying, bypassed CORS policy with XSS on v8. Cross-pollinated fuzzers with AFL, American fuzzing. Spun full control on V8 engine through OOB mem access, bypassed hardcoded security checks with stolen entropy. ATE KPTI and nullified user-space isolation. Forkbombed your stack while silently monitoring your keystrokes via syscall hijacking.

 Рейтинг

Разместить Аватар Пользователь  Тип аккаунта Язык Рейтинг  Объяснения баллов Оценка
# 100970 jof300 jof300 curious 135
# 100970 mybrave mybrave curious 135
# 104319 kallsyms kallsyms curious 130
# 107242 mohamed ghodbane mohamed ghodbane curious 125
# 107113 vil1 vil1 curious 125
Показать все

 Валидации


0%
0%
0%
0%
0%
0%
0%
0%
12%
3%
0%

1% 7/602


 Взносы

0 / 5
Нет

 Недавняя деятельность