We speedran BlockCTF 2024 and placed 1st. Here are the writeups for all of our solves.
Understanding how Linux loads dynamic libraries through program interpreters, dynamic segments, and dependency resolution.
Exploiting a use-after-free vulnerability in Rust std::iter::RepeatN with Rc to achieve arbitrary read/write and RCE through libc cancellation handlers.
A tongue-in-cheek look at common CTF challenge patterns and tropes that make us roll our eyes.
We finally have a website!