jackfromeast / web-pwn

A collection of ctf 'web-pwn' challenges, which require the exploitation of memory-related vulnerabilities within essential web components like v8, php runtime, and others

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

What is the web-pwn?

The 'web-pwn' is a term that describes the exploitation of memory-related vulnerabilities within essential web components like browsers, JavaScript runtimes, PHP runtimes, and others.

This repository is used to collect a list of ctf challenges of 'web-pwn' with the description, attachments, exp and writeups.

TODO: hope we can find another way of classification instead of the challenges. For the how2heap, they use heap exploitation techniques.

Overview

Artifact Version Time Vuln Description CTF Challenge
V8 b027d36 2019-Apr-05 Manually introduced oob vulnerability *CTF 2019 oob-v8
V8 b027d36 2024-Sep-22 Manually introduced oob vulnerability PatriotCTF 2024 babyxss

Deployment

To ensure a smoother deployment process, I will supply Dockerfiles designed to create a self-contained environment, streamlining the building and debugging of the binary. Constructing a vulnerable version of the binary from 3 or 4 years ago involves more than just executing a git checkout command. Challenges often arise due to inconsistencies in your system environment and build scripts, which can lead to unexpected errors. By utilizing the Dockerfile, you can effectively address these issues in a contained environment, avoiding any disruption to your host machine's current configuration.

About

A collection of ctf 'web-pwn' challenges, which require the exploitation of memory-related vulnerabilities within essential web components like v8, php runtime, and others


Languages

Language:JavaScript 80.1%Language:Dockerfile 19.9%