<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Pwn on Frederik353</title>
    <link>https://frederik353.github.io/writeups/topics/pwn/</link>
    <description>Recent content in Pwn on Frederik353</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <copyright>© 2026 Frederik Tokle Negård</copyright>
    <lastBuildDate>Sat, 25 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://frederik353.github.io/writeups/topics/pwn/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>Velvet Table</title>
      <link>https://frederik353.github.io/writeups/ctfs/umd-26/velvet-table/</link>
      <pubDate>Sat, 25 Apr 2026 00:00:00 +0000</pubDate>
      
      <guid>https://frederik353.github.io/writeups/ctfs/umd-26/velvet-table/</guid>
      <description>Glibc 2.32+ heap note manager wrapped in heavy XOR obfuscation. An inverted size check in the cashout handler turns the dev’s careful tcache bookkeeping into a free UAF, with a slightly longer smallbin attack waiting behind it as the intended path.</description>
      
    </item>
    
    <item>
      <title>Phantom</title>
      <link>https://frederik353.github.io/writeups/ctfs/0xfunctf-26/phantom/</link>
      <pubDate>Sat, 14 Feb 2026 00:00:00 +0000</pubDate>
      
      <guid>https://frederik353.github.io/writeups/ctfs/0xfunctf-26/phantom/</guid>
      <description>Physical page UAF in a kernel module: reclaim the freed page as a PMD, forge 2MB huge page entries for arbitrary physical memory R/W, and overwrite modprobe_path to read the flag.</description>
      
    </item>
    
    <item>
      <title>Tcademy</title>
      <link>https://frederik353.github.io/writeups/ctfs/lactf-26/tcademy/</link>
      <pubDate>Sun, 08 Feb 2026 00:00:00 +0000</pubDate>
      
      <guid>https://frederik353.github.io/writeups/ctfs/lactf-26/tcademy/</guid>
      <description>Heap exploitation on glibc 2.35: integer underflow to massive heap overflow, and two paths to shell: libc GOT overwrite or House of Apple 2 FSOP.</description>
      
    </item>
    
    <item>
      <title>AHC - Average Heap Challenge</title>
      <link>https://frederik353.github.io/writeups/ctfs/pascal-26/ahc/</link>
      <pubDate>Sun, 01 Feb 2026 00:00:00 +0000</pubDate>
      
      <guid>https://frederik353.github.io/writeups/ctfs/pascal-26/ahc/</guid>
      <description>Tcache bin confusion via chunk size corruption.</description>
      
    </item>
    
    <item>
      <title>Grande Inutile Tool</title>
      <link>https://frederik353.github.io/writeups/ctfs/pascal-26/grande-inutile-tool/</link>
      <pubDate>Sat, 31 Jan 2026 00:00:00 +0000</pubDate>
      
      <guid>https://frederik353.github.io/writeups/ctfs/pascal-26/grande-inutile-tool/</guid>
      <description>Buffer overflow corrupts path validation flag, enabling path traversal.</description>
      
    </item>
    
    <item>
      <title>Ruid_login</title>
      <link>https://frederik353.github.io/writeups/ctfs/scarlet-26/ruid_login/</link>
      <pubDate>Sat, 10 Jan 2026 00:00:00 +0000</pubDate>
      
      <guid>https://frederik353.github.io/writeups/ctfs/scarlet-26/ruid_login/</guid>
      <description>Exploiting predictable RUIDs, buffer overflow, and executable stack for shellcode execution.</description>
      
    </item>
    
    <item>
      <title>speedjournal</title>
      <link>https://frederik353.github.io/writeups/ctfs/scarlet-26/speedjournal/</link>
      <pubDate>Sat, 10 Jan 2026 00:00:00 +0000</pubDate>
      
      <guid>https://frederik353.github.io/writeups/ctfs/scarlet-26/speedjournal/</guid>
      <description>Exploiting a TOCTOU race condition to bypass authentication checks.</description>
      
    </item>
    
    <item>
      <title>Encryptor</title>
      <link>https://frederik353.github.io/writeups/ctfs/ept-25/encryptor/</link>
      <pubDate>Sat, 08 Nov 2025 00:00:00 +0000</pubDate>
      
      <guid>https://frederik353.github.io/writeups/ctfs/ept-25/encryptor/</guid>
      <description>Leaking a stack canary using RC4 keystream bias, then ret2win.</description>
      
    </item>
    
  </channel>
</rss>
