<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
    <channel>
        <title>umassctf2023 - Tag - cdpointpoint Hugo Site</title>
        <link>http://example.org/tags/umassctf2023/</link>
        <description>umassctf2023 - Tag - cdpointpoint Hugo Site</description>
        <generator>Hugo -- gohugo.io</generator><language>en</language><managingEditor>cdpointpoint@gmail.com (cdpointpoint)</managingEditor>
            <webMaster>cdpointpoint@gmail.com (cdpointpoint)</webMaster><lastBuildDate>Sat, 01 Apr 2023 00:00:00 &#43;0000</lastBuildDate><atom:link href="http://example.org/tags/umassctf2023/" rel="self" type="application/rss+xml" /><item>
    <title>Welcome to hell</title>
    <link>http://example.org/welcome_to_hell/</link>
    <pubDate>Sat, 01 Apr 2023 00:00:00 &#43;0000</pubDate>
    <author>cdpointpoint</author>
    <guid>http://example.org/welcome_to_hell/</guid>
    <description><![CDATA[#Welcom to Hell
Introduction This post is a write-up of a pwn challenge from UMASSCTF 2023.
You can discover a nice obfuscation technic using sys_rt_sigreturn syscall.
You can find le binary here : welcome_to_hell.zip
Discovery Starting, the program wait from some entry.
./welcome_to_hell abcdef # def bash: def: command not found It seem read the 3 first characters submitted.
ghidra investigation : We can see some stranges function names.
The main is this one :]]></description>
</item>
</channel>
</rss>
