blog.itarow.xyz/posts/bzhctf2024_mte

Preview meta tags from the blog.itarow.xyz website.

Linked Hostnames

13

Search Engine Appearance

Google

https://blog.itarow.xyz/posts/bzhctf2024_mte

Breizh CTF 2024 - Write-up MTE - Pwn

Some write up of cool CTF's challenges and infosec content



Bing

Breizh CTF 2024 - Write-up MTE - Pwn

https://blog.itarow.xyz/posts/bzhctf2024_mte

Some write up of cool CTF's challenges and infosec content



DuckDuckGo

https://blog.itarow.xyz/posts/bzhctf2024_mte

Breizh CTF 2024 - Write-up MTE - Pwn

Some write up of cool CTF's challenges and infosec content

  • General Meta Tags

    10
    • title
      Breizh CTF 2024 - Write-up MTE - Pwn | Itarow
    • charset
      utf-8
    • X-UA-Compatible
      IE=edge
    • description
      Some write up of cool CTF's challenges and infosec content
    • viewport
      width=device-width, initial-scale=1
  • Open Graph Meta Tags

    4
    • og:title
      Breizh CTF 2024 - Write-up MTE - Pwn
    • og:description
      Here is the write-up of MTE challenge which I created for the Breizh CTF 2024. This is a Pwn challenge classified as difficult/very difficult. Description Do you know MTE? It's a new feature on the latest ARM CPUs, no more exploitation in the heap, what happiness! I've implemented it on top of glibc in a little binary emulated via qemu, so you can't pwn it, but ... Reverse For this challenge, we have an aarch64 binary, and from the description, we know it implicates implementation of MTE technology over glibc.
    • og:type
      article
    • og:url
      https://blog.itarow.xyz/posts/bzhctf2024_mte/
  • Twitter Meta Tags

    3
    • twitter:card
      summary
    • twitter:title
      Breizh CTF 2024 - Write-up MTE - Pwn
    • twitter:description
      Here is the write-up of MTE challenge which I created for the Breizh CTF 2024. This is a Pwn challenge classified as difficult/very difficult. Description Do you know MTE? It's a new feature on the latest ARM CPUs, no more exploitation in the heap, what happiness! I've implemented it on top of glibc in a little binary emulated via qemu, so you can't pwn it, but ... Reverse For this challenge, we have an aarch64 binary, and from the description, we know it implicates implementation of MTE technology over glibc.
  • Link Tags

    8
    • canonical
      https://blog.itarow.xyz/posts/bzhctf2024_mte/
    • icon
      https://blog.itarow.xyz/images/favicon.ico
    • preload
      /lib/font-awesome/webfonts/fa-brands-400.woff2
    • preload
      /lib/font-awesome/webfonts/fa-regular-400.woff2
    • preload
      /lib/font-awesome/webfonts/fa-solid-900.woff2

Emails

1
  • ?subject=Breizh%20CTF%202024%20-%20Write-up%20MTE%20-%20Pwn&body=Check out this article: https%3a%2f%2fblog.itarow.xyz%2fposts%2fbzhctf2024_mte%2f

Links

18