pwncollege
DojosLeaderboardCommunity
Back to cse598-avr-f2024

PAC

cse598-avr-f2024
0/4 challenges completed

How can we achieve control flow hijacking when given arbitrary read / arbitrary write when Pointer Authentication (PAC) is enabled?

All of the challenges will have a different kext.

Critical Note: The machines that you are working on are purely ephemeral and none of your data there is saved!

This means that you must, must, must, save your files / solution locally if you want them to persist.

You've been warned.

Also, you can only use ssh [email protected] to acess the server, the Workspace and Desktop don't work.

Pointer Authentication (PAC)
Video
Slides
Suggested Reading
1
Direct Gadget IA Key
2
Substitute Values IA Key
3
Brute Force IA Key
4
Signing Gadget IA Key