Zhongyu Pei
62 posts

Zhongyu Pei
@BrieflyX
Security researcher from Alibaba Inc. / Tsinghua University CTF player of Tea-deliverers / Blue-lotus Fuzzing / Binary Analysis
Katılım Mayıs 2017
205 Takip Edilen691 Takipçiler

Really enjoy defcon ctf 29 finals and excellent challenges!
We would all remember @oooverflow's effort to make this game awesome.
I write a small retrospective blog (in Chinese) to memorize this last masterpiece from OOO.
brieflyx.me/2021/dc29-memo/
English

Hope you enjoy it :)
And the home challenge is not my idea😂
Real World CTF@RealWorldCTF
SHOUT OUT to the top 3: CodeR00t, Sauercloud and 217. Congrats!~ The 3rd Real World CTF comes to an end! We hope you enjoy the Real World hacking! #realworldctf
English

@r3tr0sp3ct2019 Well I guess there is no 'oops=panic' parameter when booting kernel, thus the GFP as a non-fatal exception just makes the process die, instead of making kernel panic.
English

Trigger a crash in kernel to leak the addresses...I am quite surprised by this technique...😂Since in my impression a crash in kernel always causes reboot...
Zhongyu Pei@BrieflyX
I solved spark in HITCON CTF 2020. The CONFIG_SLAB_FREELIST_HARDENED made it hard to exploit via a single UAF and costs much of my time. Eventually another out-of-bound bug in query algorithm saved me. Thanks to @david942j for 2 interesting kernel chals! github.com/BrieflyX/ctf-p…
English

I solved spark in HITCON CTF 2020.
The CONFIG_SLAB_FREELIST_HARDENED made it hard to exploit via a single UAF and costs much of my time. Eventually another out-of-bound bug in query algorithm saved me.
Thanks to @david942j for 2 interesting kernel chals!
github.com/BrieflyX/ctf-p…
English

@sampriti0 @david942j Cool! I never thought about exploiting only with arbitrary kfree, quite imaginative haha.
English

@david942j I vote for atoms since many teams solved it via unintended bugs. I would like to see how to trigger the real deadlock XD.
English

Published all the sources and solutions of my challenges for #HITCON CTF 2020: github.com/david942j/ctf-…
Which challenge would you most like me to have a writeup 😀?
English

Thanks for sending me many messages.
To my honour, I became a member of @FlatNetworkOrg 🌐
English

My writeup for kstack in #secconctf #seccon 2020.
Thanks to @ptrYudai for this excellent challenge, I learned a lot from your blog :)
The power of setxattr + userfaultfd + modprobe_path hajicking is quite marvelous in kernel exploitation.
github.com/BrieflyX/ctf-p…
English





