upvote
You learn the most random ways to abuse program features, one I still remember because of how long it took to figure it out was an htb box that (after a long exploitation path) used NTFS ADS to hide the flag within the alternate stream in a decoy file; and of course the normal way to extract the stream was disabled so had to do some black magic with other binaries to get it
reply
I don't think I've used any of these in a CTF tbh
reply
I've definitely used one or two in the last 6 months
reply
For what kind of challenge? Most of these are not even available in CTF environments
reply
I've used them for pwncollege CTFs but pwncollege is way below your level (I've seen some of your write ups before).
reply
deleted
reply
Huh? How does that work exactly? I've heard of /proc fuckery before but didn't know you could disable aslr with it.
reply
If you have /proc available, you don't even need to disable ASLR (all mappings are available to you)
reply
Hey you know what, I've used dd to write into process memory but haven't actually used it to disable KASLR, so it's possible I am misremembering. My bad.
reply
:(

Sounds super 1337 and I hope it's actually possible somehow.

reply
Parse /proc/<pid>/maps to find the relevant target_addr in your process-under-attack. And then its a matter of:

    $ dd if=shellcode.bin of=/proc/<pid>/mem bs=1 seek=$((target_addr)) ...
See also: DDExec

https://github.com/arget13/DDexec

reply