tl;dr
- Using the rotate chains method to exploit ruby class pollution to leak Legacy cookie via SQLI.
- Using a 1-Gadget ruby deserialization vector to get RCE in a clever way.
- Using a bunch of other clever tactics for exploitation.
tl;dr
tl;dr
tl;dr
tl;dr
tl;dr
memcpy
in CPY
goes out-of-bounds of VM stack. memcpy
to copy the register struct to stack and modify the values using stack operations and register operations.bp
and sp
registers.environ
pointer to get stack leak.main
function’s stack to overwrite return address with ROP chain or one-gadget.tl;dr
tl;dr
tl;dr
tl;dr
1 / 19