b6a.black/posts/2020-07-01-confidencectf-teaser-chromatic
Preview meta tags from the b6a.black website.
Linked Hostnames
6- 8 links tob6a.black
- 1 link toblog.exodusintel.com
- 1 link todocs.google.com
- 1 link togit.io
- 1 link togithub.com
- 1 link togohugo.io
Thumbnail

Search Engine Appearance
CONFidence 2020 Teaser CTF: Chromatic Aberration
In this CTF Question, author introduced a OOB read and arbitary write to the Array.fill of the V8 engine. So, our exploitation will be very straightforward. First, we will set up an array of BitInts with 0x33313131 as marking for arbitary write after we collect sufficient primitive with the OOB.
Bing
CONFidence 2020 Teaser CTF: Chromatic Aberration
In this CTF Question, author introduced a OOB read and arbitary write to the Array.fill of the V8 engine. So, our exploitation will be very straightforward. First, we will set up an array of BitInts with 0x33313131 as marking for arbitary write after we collect sufficient primitive with the OOB.
DuckDuckGo
CONFidence 2020 Teaser CTF: Chromatic Aberration
In this CTF Question, author introduced a OOB read and arbitary write to the Array.fill of the V8 engine. So, our exploitation will be very straightforward. First, we will set up an array of BitInts with 0x33313131 as marking for arbitary write after we collect sufficient primitive with the OOB.
General Meta Tags
13- titleCONFidence 2020 Teaser CTF: Chromatic Aberration | Black Bauhinia
- charsetutf-8
- X-UA-CompatibleIE=edge
- viewportwidth=device-width, initial-scale=1, shrink-to-fit=no
- robotsindex, follow
Open Graph Meta Tags
5- og:titleCONFidence 2020 Teaser CTF: Chromatic Aberration
- og:descriptionIn this CTF Question, author introduced a OOB read and arbitary write to the Array.fill of the V8 engine. So, our exploitation will be very straightforward. First, we will set up an array of BitInts with 0x33313131 as marking for arbitary write after we collect sufficient primitive with the OOB.
- og:typearticle
- og:urlhttps://b6a.black/posts/2020-07-01-confidencectf-teaser-chromatic/
- og:imagehttps://b6a.black/images/2020-07-01-confidencectf/2.png
Twitter Meta Tags
4- twitter:cardsummary_large_image
- twitter:imagehttps://b6a.black/images/2020-07-01-confidencectf/2.png
- twitter:titleCONFidence 2020 Teaser CTF: Chromatic Aberration
- twitter:descriptionIn this CTF Question, author introduced a OOB read and arbitary write to the Array.fill of the V8 engine. So, our exploitation will be very straightforward. First, we will set up an array of BitInts with 0x33313131 as marking for arbitary write after we collect sufficient primitive with the OOB.
Link Tags
7- canonicalhttps://b6a.black/posts/2020-07-01-confidencectf-teaser-chromatic/
- iconhttps://b6a.black/favicon.ico
- preconnecthttps://fonts.gstatic.com
- preload stylesheet/assets/css/stylesheet.min.79c4dfee3993cd3110886e38d36a5106e0d6922344cefa3ff5c0076f246815f0.css
- stylesheethttps://fonts.googleapis.com/css2?family=Recursive&display=swap
Links
13- https://b6a.black
- https://b6a.black/about-us
- https://b6a.black/posts/2019-10-02-pwnthybytes
- https://b6a.black/posts/2020-07-22-uiuctf-nookcrypt
- https://b6a.black/tags/browser-exploit