Shopping Cart

Your cart is currently empty.

Letssplitturtles.part02.rar Official

The "Turtles" challenge involved a program that processed nested structures (turtles). Each "turtle" contained pointers to other turtles, creating a complex chain. The objective for Part 2 was to transition from the initial memory leak (achieved in Part 01) to a controlled "magic gadget" execution. Technical Analysis

The core of this stage involved crafting a precision payload that aligned with the program's expectations of the turtle structure while redirecting the instruction pointer.

: Using the leak obtained previously, the payload had to account for specific register offsets. Payload Structure : LetsSplitTurtles.part02.rar

For a deep dive into the specific assembly and memory offsets used in this exploit, you can view the full technical breakdown on nickcano.com .

This write-up covers the second part of the challenge from CSAW CTF, focusing on the exploitation of a recursive data structure to achieve code execution. Challenge Overview The "Turtles" challenge involved a program that processed

: The payload specifically targeted RDX and RAX to set up the final call.

: By placing a magic_gadget address at a specific offset ( +0x60 ), the program was forced to execute the desired shellcode or function when it attempted to traverse to the "next" turtle. Execution & Debugging Technical Analysis The core of this stage involved

: A 64-byte ( 0x40 ) buffer of null bytes provided a safe landing zone for the program's internal processing.

Copyright © 2025 Keene Engineering. | Ecommerce Shopping Cart Software by Miva, Inc.