GeistHaus
log in · sign up

Exploiting Chrome V8: Krautflare (35C3 CTF 2018) · Jay Bosamiya

jaybosamiya.com

In this challenge, we had to obtain remote code execution, simply by exploiting a 1-day bug that forgot the difference between -0 and +0. This has probably been one of the most difficult, fun, and frustrating bugs I have ever exploited.

5 pages link to this URL
Chrome Browser Exploitation, Part 2: Introduction to Ignition, Sparkplug and JIT Compilation via TurboFan

In my previous post “Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals”, we took our first deep dive into the world of browser exploitation by covering a few complex topics that were necessary for fundamental knowledge. We mainly covered topics on how JavaScript and V8 worked under the hood by exploring what objects, maps and shapes were, how these objects were structured in memory, and we also covered some basic memory optimizations such as pointer tagging and pointer compression. We also touched on the compiler pipeline, bytecode interpreter, and code optimizations.

2 inbound links article en
Diary of a reverse-engineer
0 inbound links en exploitationmiscreverse-engineering Pwn2Own MiamiPwn2Own 2022ICSParacosmeICONICSICONICS Genesis64Genesis640-click remote code executionCVE-2022-33318ZDI-22-1041ICSA-22-202-04GenBroker64.exeexploitationmemory-corruptionPwn2Own AustinprinterscanonMF644CdwImageCLASSCVE-2022-24674ZDI-22-516Pwn2OwnroutersTP-LinkArcher C7TP-Link Archer C7 V5Zenithremote kernelNetUSBCVE-2022-24354IDAbug-bountysnapshot fuzzingkvmwinhvwhvbochsfuzzingbochscputcpip.sysCVE-2021-24086Ipv6pReassembleDatagramfragmentationrecursive-fragmentationchromev8turbofanionionmonkeyspidermonkeyfirefoxblazefoxwindowsttd