/ UHF (380-527 ) / Kenwood

Letssplitturtles.part02.rar 〈360p〉

661 0/14


:



:

:     LPD LPD

:     PMR PMR

:  CB  CB

:  .  ,  . ,

:      Motorola  CP Motorola CP

:      Motorola  GP Motorola GP

:

:

:

:

:

:  CTCSS CTCSS

:   DCS DCS

:

:

:

:      - -

:     FRS FRS

:     GMRS GMRS

:   ()    - () -

:

Letssplitturtles.part02.rar 〈360p〉

: The first 16 bytes of the payload were used to point the RDI register toward a "slack" space in memory.

For a deep dive into the specific assembly and memory offsets used in this exploit, you can view the full technical breakdown on nickcano.com . LetsSplitTurtles.part02.rar

This write-up covers the second part of the challenge from CSAW CTF, focusing on the exploitation of a recursive data structure to achieve code execution. Challenge Overview : The first 16 bytes of the payload

The exploit was verified using to step through the turtle traversal logic. A critical finding during this phase was that the RBP (Base Pointer) register did not land at the expected offset, requiring a slight adjustment to the slack space to ensure the magic gadget was reached successfully. Challenge Overview The exploit was verified using to

The core of this stage involved crafting a precision payload that aligned with the program's expectations of the turtle structure while redirecting the instruction pointer.

: A 64-byte ( 0x40 ) buffer of null bytes provided a safe landing zone for the program's internal processing.

: Using the leak obtained previously, the payload had to account for specific register offsets. Payload Structure :




   
 

, . 4 "", 200
+7 (861) 945-35-55



7- , . 186
+7 (3812) 50-60-00

"Cookies".



Icom
-
Kenwood TK-3107 -