webmedium

on error resume next

hxp_39c3

Task: obtain 1337 credits in a Go bank application to buy the flag. Solution: exploit the type mismatch between MySQL BIGINT UNSIGNED and Go int64 — create a user with id=2^63, causing rows.Scan() overflow which zeroes the receiver field, creating infinite money for user id=0.

$ ls tags/ techniques/
Integer overflow exploitation (BIGINT UNSIGNED to int64)Error ignoring pattern abuseType mismatch between database and applicationInfinite money glitch via scan failure

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]