pwnProeasy
Name
grodno_new_year_2026
Task: Binary session manager with create/delete/feedback/greet operations where delete frees memory without clearing the pointer. Solution: Exploited a classic Use-After-Free: created a session, freed it (dangling pointer), allocated feedback of the same size (reusing the chunk), overwrote the function pointer at offset 0x18 with admin_shell address, then triggered greet to call it.
$ ls tags/ techniques/
use_after_freeheap_reusefunction_pointer_overwritedangling_pointer
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [pwn][Pro]bad_mood— grodno_new_year_2026
- [pwn][Pro]New year party— grodno_new_year_2026
- [pwn][Pro]Taste— grodno_new_year_2026
- [pwn][Pro]Secrets— grodno_new_year_2026
- [pwn][Pro]pwn9_mc4 — Mic Check: leak and pwn!— spbctf