Channel | Publish Date | Thumbnail & View Count | Actions |
---|---|---|---|
| Publish Date not found | ![]() 0 Views |
/”Unsubscriptions Are Free/” (Pwn) challenge from PicoGym (picoCTF) – /”Check out my new video-game and spaghetti-eating streaming channel on Twixer!/”. In this challenge we’ll use Ghidra, GDB-PwnDbg and PwnTools to exploit a Use After Free (UAF) vulnerability and read the flag. Write-ups/tutorials aimed at beginners – Hope you enjoy #Pwn #BinaryExploitation #BinExp #CTF #CaptureTheFlag #Pico #picoctf
↢PicoCTF↣
https://play.picoctf.org/practice/challenge/187
https://picoctf.org/discord
https://twitter.com/picoctf
️Resources
https://cryptocat.me/resources
↢Chapters↣
Start: 0:00
Basic file checks: 0:24
Review source code: 1:17
Ghidra analysis: 6:44
Debug with GDB-PwnDbg: 8:06
PwnTools Script: 13:07
End: 16:46
Please take the opportunity to connect and share this video with your friends and family if you find it useful.