Exploiting a Use-After-Free (UAF) Vulnerability – “Unsubscriptions Are Free” Pwn Challenge [PicoGym]

Exploiting a Use-After-Free (UAF) Vulnerability – “Unsubscriptions Are Free” Pwn Challenge [PicoGym]

HomeOther ContentExploiting a Use-After-Free (UAF) Vulnerability – “Unsubscriptions Are Free” Pwn Challenge [PicoGym]
ChannelPublish DateThumbnail & View CountActions
Channel AvatarPublish Date not found Thumbnail
0 Views
/”Unsubscriptions Are Free/” (Pwn) challenge from PicoGym (picoCTF) – /”Check out my new video-game and spaghetti-eating streaming channel on Twixer!/”. In this challenge we’ll use Ghidra, GDB-PwnDbg and PwnTools to exploit a Use After Free (UAF) vulnerability and read the flag. Write-ups/tutorials aimed at beginners – Hope you enjoy #Pwn #BinaryExploitation #BinExp #CTF #CaptureTheFlag #Pico #picoctf

↢PicoCTF↣
https://play.picoctf.org/practice/challenge/187
https://picoctf.org/discord
https://twitter.com/picoctf

‍️Resources
https://cryptocat.me/resources

↢Chapters↣
Start: 0:00
Basic file checks: 0:24
Review source code: 1:17
Ghidra analysis: 6:44
Debug with GDB-PwnDbg: 8:06
PwnTools Script: 13:07
End: 16:46

Please take the opportunity to connect and share this video with your friends and family if you find it useful.