GeistHaus
log in · sign up

TurboFan

v8.dev

This document collects resources about TurboFan, V8’s optimizing compiler.

11 pages link to this URL
Diary of a reverse-engineer
0 inbound links en exploitationmiscreverse-engineering Pwn2Own MiamiPwn2Own 2022ICSParacosmeICONICSICONICS Genesis64Genesis640-click remote code executionCVE-2022-33318ZDI-22-1041ICSA-22-202-04GenBroker64.exeexploitationmemory-corruptionPwn2Own AustinprinterscanonMF644CdwImageCLASSCVE-2022-24674ZDI-22-516Pwn2OwnroutersTP-LinkArcher C7TP-Link Archer C7 V5Zenithremote kernelNetUSBCVE-2022-24354IDAbug-bountysnapshot fuzzingkvmwinhvwhvbochsfuzzingbochscputcpip.sysCVE-2021-24086Ipv6pReassembleDatagramfragmentationrecursive-fragmentationchromev8turbofanionionmonkeyspidermonkeyfirefoxblazefoxwindowsttd
An Introduction to Chrome Exploitation - Maglev Edition

Introduction Originally, I intended to write a simple note on the Maglev compiler and how to adjust V8 shellcode from Linux to Windows. But as I started, the project grew unexpectedly. I found myself diving into some prerequisites like the V8 pipeline and a root cause analysis of CVE-2023-4069, the bug we are about to explore. What began as a brief memo soon unfolded into a deeper exploration and I hope the reader will find some benefits from these additional insights.

2 inbound links en CC BY-NC 4.0
Exploiting Chrome V8: Krautflare (35C3 CTF 2018) · Jay Bosamiya

In this challenge, we had to obtain remote code execution, simply by exploiting a 1-day bug that forgot the difference between -0 and +0. This has probably been one of the most difficult, fun, and frustrating bugs I have ever exploited.

5 inbound links en jaybosamiyajaybosamiyajaybCTF-Writeupspwningctfc3pppv81day-exploitjavascript-engine