pwnProhard
New Age
0xl4ugh
Task: Read a flag file through a seccomp sandbox that blocks open, openat, execve, and other syscalls with conditional read/write buffer restrictions. Solution: Use openat2 syscall (number 437, added in Linux 5.6) which was not in the seccomp blocklist, read into the high-address allowed region, copy to low-address region, and write to stdout.
$ ls tags/ techniques/
seccomp_bypassnewer_syscall_abusemanual_shellcode
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [pwn][Pro]read_me_not — sendfile bypass— spbctf
- [pwn][Pro]cat /flag under seccomp— spbctf
- [pwn][free]0xDiablos— hackthebox
- [pwn][free]Execute (pwn_execute)— hackthebox
- [pwn][Pro]New year party— grodno_new_year_2026