I removed an unintended bug, updated my exploit to RS4 and brought my elgoog challenge from 34c3ctf back to life for WCTF. @j00ru managed to solved it without the intended pool metadata corruption, nice
By the way, set_addr(), read(), write(), steal_token() etc. seem to be artifacts of some other exploitation route?
-
-
Yeah, the RS3 exploit used palettes because it was running as low integrity.
-
Ah, makes sense, cheers. :)
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.