Skip to content

Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)

Notifications You must be signed in to change notification settings

JeremyFetiveau/pwn-just-in-time-exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Exploit for the TurboFan challenge from Google CTF 2018

Just In Time is a an exploitation challenge written by Stephen 'tsuro' Röttger for Google CTF 2018.

I wrote an introduction to TurboFan article on doare-e.github.io that explains the bug and its exploitation.

When working on v8, I use a customized engine for which I added some features. One of those is available on my other repo.

You may also want to have a look at a few experiments.

Overview

For just-in-time, you are provided with a modified v8 engine.

It contains a vulnerable TurboFan reduction (understand : optimization pass).

This reduction tries to (incorrectly) optimize duplicate additions such as x + 1 + 2.

This repository contains a full exploit for this bug. It also uses WebAssembly to get RWX memory.

pwnd

About

Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published