n132 (@n132xxx) 's Twitter Profile
n132

@n132xxx

wooooo, PPPPwn github.com/n132

ID: 867614915464355841

calendar_today25-05-2017 05:34:50

43 Tweet

260 Takipçi

309 Takip Edilen

n132 (@n132xxx) 's Twitter Profile Photo

ROP on GOT! We noticed there is a mitigation for the latest versions to avoid attackers using glibc GOT easily. However, got in libc is still writable, hence swing and I designed another method to achieve RCE with once Arbitrary Write: github.com/n132/Libc-GOT-…

ROP on GOT!

We noticed there is a mitigation for the latest versions to avoid attackers using glibc GOT easily. However, got in libc is still writable, hence <a href="/bestswngs/">swing</a> and I designed another method to achieve RCE with once Arbitrary Write:

github.com/n132/Libc-GOT-…
n132 (@n132xxx) 's Twitter Profile Photo

Played Dice CTF with Shellphish this weekend. CTF is always an efficient way to learn little skills. Now I know more about one_gadget (Learned from zolutal !) Write up for challenges I played: github.com/n132/CTF-Write…

n132 (@n132xxx) 's Twitter Profile Photo

Now people can't guess the heap base address easily. The original vulnerability: If we can leak the PIE we can brute force the heap base and we can even overflow from BSS to the heap. github.com/n132/BeapOverf… It's also the first time I reported a Linux kernel vulnerability!

Now people can't guess the heap base address easily.

The original vulnerability: If we can leak the PIE we can brute force the heap base and we can even overflow from BSS to the heap. 

github.com/n132/BeapOverf…

It's also the first time I reported a Linux kernel vulnerability!
Brendan Dolan-Gavitt (@moyix) 's Twitter Profile Photo

Our paper on ARVO, a huge (5000+) dataset of reproducible (w/PoC), recompilable vulns in open-source C/C++ projects is now up on arXiv! Awesome work by n132, X3eRo0, Jordi Del Castillo, Haoran Xi, Abdelouahab Benchikh, & profs from NYU/ASU/UNSW arxiv.org/abs/2408.02153

Our paper on ARVO, a huge (5000+) dataset of reproducible (w/PoC), recompilable vulns in open-source C/C++ projects is now up on arXiv! Awesome work by <a href="/n132XxX/">n132</a>, <a href="/X3eRo0/">X3eRo0</a>, Jordi Del Castillo, Haoran Xi, Abdelouahab Benchikh, &amp; profs from NYU/ASU/UNSW arxiv.org/abs/2408.02153
Brendan Dolan-Gavitt (@moyix) 's Twitter Profile Photo

n132 X3eRo0 Thanks to n132, there is now also a repo with JSON metadata for each vulnerability and the patch identified by ARVO as fixing the vulnerability! github.com/n132/ARVO-Meta/

<a href="/n132XxX/">n132</a> <a href="/X3eRo0/">X3eRo0</a> Thanks to <a href="/n132XxX/">n132</a>, there is now also a repo with JSON metadata for each vulnerability and the patch identified by ARVO as fixing the vulnerability! github.com/n132/ARVO-Meta/
n132 (@n132xxx) 's Twitter Profile Photo

I didn't try many C++ pwn but found it easier to gain RCE (after arbitrary writing) on a C++ binary: The libstdc++ is still partial RELRO, meaning we can hijack its GOT.

I didn't try many C++ pwn but found it easier to gain RCE (after arbitrary writing) on a C++ binary: The libstdc++ is still partial RELRO, meaning we can hijack its GOT.
Brendan Dolan-Gavitt (@moyix) 's Twitter Profile Photo

The code for building and updating the ARVO dataset, a collection of over 5000 memory safety vulnerabilities in open source software, is now open source! Link in reply :)

The code for building and updating the ARVO dataset, a collection of over 5000 memory safety vulnerabilities in open source software, is now open source! Link in reply :)
Hex-Rays SA (@hexrayssa) 's Twitter Profile Photo

We are thrilled to announce our first group of sponsored CTF Teams! Top-Tier Teams 💎 justCatTheFish 💎 Kalmarunionen 💎 r3kapig Rising Star Team 🌟 PwnSec Learn more about our partnership and the teams here: hex-rays.com/blog/2025-spon…

We are thrilled to announce our first group of sponsored CTF Teams! 

Top-Tier Teams
💎 <a href="/justCatTheFish/">justCatTheFish</a> 
💎 <a href="/kalmarunionenDM/">Kalmarunionen</a>
💎 <a href="/r3kapig/">r3kapig</a> 

Rising Star Team
🌟 <a href="/_PwnSec_/">PwnSec</a> 

Learn more about our partnership and the teams here: hex-rays.com/blog/2025-spon…