pwnhard
holy_cit
miptctf
Task: exploit a CRUD service written in HolyC (TempleOS language) compiled with hcc for Linux, featuring a custom allocator wrapping glibc malloc with an 8-byte size header. Solution: exploit _REALLOC bug that copies old_size instead of min(old_size, new_size) to overflow 8 bytes into adjacent chunks, forge HolyC size headers to create fake unsorted bin chunks for libc leak, overlapping chunks for heap leak, then tcache poisoning with safe-linking bypass for arbitrary write and ROP chain execution.
$ ls tags/ techniques/
pieheappwnglibc_2.39tcache_poisoningsafe_linking_bypassholyccustom_allocatorrealloc_overflowsize_forgeryunsorted_bin_leakoverlapping_chunks
tcache_poisoningsafe_linking_bypassrop_chainunsorted_bin_leakholyc_size_header_forgeryrealloc_overflowheap_leak_via_overlapstack_leak
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]