Letssplitturtles.part02.rar May 2026

: The first 16 bytes of the payload were used to point the RDI register toward a "slack" space in memory.

: The payload specifically targeted RDX and RAX to set up the final call. LetsSplitTurtles.part02.rar

: By placing a magic_gadget address at a specific offset ( +0x60 ), the program was forced to execute the desired shellcode or function when it attempted to traverse to the "next" turtle. Execution & Debugging : The first 16 bytes of the payload

The exploit was verified using to step through the turtle traversal logic. A critical finding during this phase was that the RBP (Base Pointer) register did not land at the expected offset, requiring a slight adjustment to the slack space to ensure the magic gadget was reached successfully. Execution & Debugging The exploit was verified using

This write-up covers the second part of the challenge from CSAW CTF, focusing on the exploitation of a recursive data structure to achieve code execution. Challenge Overview

Scroll al inicio
Ir arriba