pwnPromedium
Secrets
grodno_new_year_2026
Task: Heap exploitation challenge with UAF vulnerability in note management. Solution: Tcache poisoning with safe-linking bypass (glibc 2.41) to overwrite admin_key buffer and trigger flag output.
$ ls tags/ techniques/
use_after_freetcache_poisoningsafe_linking_bypass
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [pwn][Pro]bad_mood— grodno_new_year_2026
- [pwn][Pro]Taste— grodno_new_year_2026
- [pwn][Pro]pwn9_mc4 — Mic Check: leak and pwn!— spbctf
- [pwn][Pro]Хранилище заметок (Notes Store)— hackerlab
- [pwn][Pro]New year party— grodno_new_year_2026