The 'web-pwn' is a term that describes the exploitation of memory-related vulnerabilities within essential web components like browsers, JavaScript runtimes, PHP runtimes, and others.
This repository is used to collect a list of ctf challenges of 'web-pwn' with the description, attachments, exp and writeups.
TODO: hope we can find another way of classification instead of the challenges. For the how2heap, they use heap exploitation techniques.
Artifact | Version | Time | Vuln Description | CTF | Challenge |
---|---|---|---|---|---|
V8 | b027d36 | 2019-Apr-05 | Manually introduced oob vulnerability | *CTF 2019 | oob-v8 |
V8 | b027d36 | 2024-Sep-22 | Manually introduced oob vulnerability | PatriotCTF 2024 | babyxss |
To ensure a smoother deployment process, I will supply Dockerfiles designed to create a self-contained environment, streamlining the building and debugging of the binary. Constructing a vulnerable version of the binary from 3 or 4 years ago involves more than just executing a git checkout command. Challenges often arise due to inconsistencies in your system environment and build scripts, which can lead to unexpected errors. By utilizing the Dockerfile, you can effectively address these issues in a contained environment, avoiding any disruption to your host machine's current configuration.