Knightctf 2023 writeup RE Category

Hi there, Last weekend, I played a CTF for fun. Here are the writeups of the tasks that I solved (Reverse Engineering category) [RE 100] Help Jimmy [RE 150] The Activator [RE 150] The Defuser [RE 200] KrackMe 1.0 [RE 250] Fan [RE 250] Take RISC five times [RE 400] Stegorev [RE 100] Help Jimmy It was a 64-bit Linux elf binary having a simple implementation where the player has to choose between going to Jungle or Sea and regardless of any decision, it ended up being attacked by tigers or pirates or an invalid choice and resulting in not getting the flag.
Read more →

Tale of OpenBSD secure memory allocator internals - malloc(3)

Hi there, It’s been a long time since I have written anything, so, continuing with the journey of reading and exloring the OpenBSD source codes with my friend debugger. This time it is about OpenBSD malloc(3), secure memory allocator I will try to keep it as n part series due to length of the blog post and this series will be mostly focussed on user-space code of malloc(3) and friends
Read more →

OpenBSD kernel internals - Lifecycle of process from user-space to kernel space :: creation

Hi there, Have you ever thought what happens internally when we execute any command/executable from the command line? We will be diving in to the ocean of kernel code internals and working of the process lifecycle (creation) in OpenBSD operating system from user-space to kernel space. We will execute the ls command from the command line then trace it through the debugger to see the magic. Following are the basic lifecycle of a process,
Read more →

OpenBSD - short intro on “execpromises” in the pledge(2)

Hi there, Today, we will be looking at the update for pledge(2) on OpenBSD and also about howto and usecase. In the previous post about pledge(2), we understood the implementation and some internal working of pledge(2) On 11 December 2017, **Theo de Raadt** said: List: openbsd-tech Subject: pledge execpromises From: Theo de Raadt Date: 2017-12-11 21:20:51 Message-ID: 6735.1513027251 () cvs ! openbsd ! org This will probably be committed in the next day or so.
Read more →

pledge(2): OpenBSD’s defensive approach to OS Security

Hello there, I would like to introduce you all to the pledge(2) which is used to restrict the system operations and supported only on OpenBSD at the time of writing the blog. I am learning about OpenBSD kernel internals and development and would like to share some tips on how to learn about OpenBSD kernel internals and development. Following materials I followed while learning about BSD kernel internals: the book “The design and implementation of the BSD operating system” by Kirk McKusick OpenBSD source code man pages and few presentations-papers on OpenBSD ask in mailing lists and OpenBSD Facebook group.
Read more →