Skip to content

Latest commit

 

History

History
22 lines (12 loc) · 1.1 KB

README.md

File metadata and controls

22 lines (12 loc) · 1.1 KB

Exploit for the TurboFan challenge from Google CTF 2018

Just In Time is a an exploitation challenge written by Stephen 'tsuro' Röttger for Google CTF 2018.

I wrote an introduction to TurboFan article on doare-e.github.io that explains the bug and its exploitation.

When working on v8, I use a customized engine for which I added some features. One of those is available on my other repo.

You may also want to have a look at a few experiments.

Overview

For just-in-time, you are provided with a modified v8 engine.

It contains a vulnerable TurboFan reduction (understand : optimization pass).

This reduction tries to (incorrectly) optimize duplicate additions such as x + 1 + 2.

This repository contains a full exploit for this bug. It also uses WebAssembly to get RWX memory.

pwnd