It's that time of year again where I take some time to reflect on UMass CTF.
This is going to be shorter than last year's. I put out eight challenges, and
I'm only going to be writing about one of them. Code, documentation, and
write-ups for the others are available here.
read more →
Well, this is certainly overdue. It's the writeup for a challenge I authored for
this year's UMass CTF, which ran from October 5th to October 12th. Yes, I'm
late. But when you attend a university that tried very hard to squeeze the
entire semester twelve weeks, you're going to deal with burnout and not nearly
enough time to do things outside of your coursework. So I'm finally coming back
to the challenge now that the semester's ended.
read more →
TL;DR, I discovered a stack-smashing vulnerability in GZDoom's interpreter for
ACS. As a preface, there's a tendency for whitepapers like this in the security
community to be written with a somewhat condescending tone towards the product's
vendor. I do not mean for any portion of this writeup to come off as degrading
to the developers involved. Yes, the bug was obvious to me, but it was still
subtle enough that it went under the radar for nearly 23 years. Most developers
aren't actively thinking about this kind of attack while writing a bytecode
interpreter. I have an enormous amount of respect for the development teams of
both GZDoom and Zandronum, who were quick to issue a patch addressing the issue
and were respectful of my wishes to release this whitepaper to the public. I'd
also like to thank everyone I had the pleasure of working with during this
process; it warms my heart to know that the communities behind these open-source
software projects are this friendly.
read more →
"funsignals" was a 250 point binary exploitation challenge with 58 solves. The
challenge itself was a very trivial example of sigreturn-oriented programming.
read more →