webmedium
on error resume next
hxp_39c3
Task: obtain 1337 credits in a Go bank application to buy the flag. Solution: exploit the type mismatch between MySQL BIGINT UNSIGNED and Go int64 — create a user with id=2^63, causing rows.Scan() overflow which zeroes the receiver field, creating infinite money for user id=0.
$ ls tags/ techniques/
mysqlgogolanginteger_overflowbigint_unsignedint64error_handlingscan_errortype_mismatchinfinite_moneybank_application
Integer overflow exploitation (BIGINT UNSIGNED to int64)Error ignoring pattern abuseType mismatch between database and applicationInfinite money glitch via scan failure
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]