pwnhard

lasOS

volgactf2026

Task: bootable custom x86_64 OS image running under QEMU+KVM with a tiny syscall ABI for untrusted ring-3 code. Solution: abuse setregs to control SYSRETQ state, trigger a ring-0 #GP with non-canonical RCX, and redirect the #GP exception-name pointer to the kernel flag string so puts() prints it.

$ ls tags/ techniques/
sysret_noncanonical_rcxkernel_rsp_controlexception_name_table_pointer_overwritering0_exception_abuse

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub to get started.

$ssh [email protected]