pwnhard

OxidePool

caplag

Task: Stripped Rust/Tokio binary with custom TCP protocol. Solution: Integer overflow in u16 bounds check allows vtable overwrite, hijacking control flow to built-in shell spawner for ASLR bypass and RCE.

$ ls tags/ techniques/
protocol_reverse_engineeringinteger_overflow_u16vtable_hijackinfo_leakdup2_execve

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]