paint-brush
Exploiting Dynamically Generated Code: 2019 KCTF Problem 5by@pwnbykenny
179 reads

Exploiting Dynamically Generated Code: 2019 KCTF Problem 5

by pwnbykenny4mDecember 2nd, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

The root cause of this bug is an inconsistency in the JIT compilation of v8. The JIT compiler of v.8 generates code that contains the array overflow bug. This is very different from normal exploitation whose exploit is data. The exploit can also be source code instead of data. And the shellcode provided here is tested on x86_64 & Linux. It’s not guaranteed that the shell code will work on other CPU architectures and operating systems. The code is used to access arbitrary memory addresses.

Company Mentioned

Mention Thumbnail
featured image - Exploiting Dynamically Generated Code: 2019 KCTF Problem 5
pwnbykenny HackerNoon profile picture
pwnbykenny

pwnbykenny

@pwnbykenny

A Ph.D. A Hacker. My personal website: https://pwnbykenny.com

About @pwnbykenny
LEARN MORE ABOUT @PWNBYKENNY'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

pwnbykenny HackerNoon profile picture
pwnbykenny@pwnbykenny
A Ph.D. A Hacker. My personal website: https://pwnbykenny.com

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite