Skip to content

areuu/ggctf20-teleport

 
 

Repository files navigation

Google CTF 2020 Teleport

Exploit code for the Chromium exploitation challenge teleport at Google CTF 2020

Challenge files

As the time of writing, you can find the challenge files on Google CTF website or this original attachment link

Building

  • Extract the challenge zip to ./chall
  • Docker build

Running

  • Serve HTTPS (because of service worker)

Hacking notes

make all to build the shellcodes

The server code is in main.go. Line 30, 36 are for HTTPS, HTTP serving, respectively

cert.pem and key.pem are needed for HTTPS hosting.

Writeup

Checkout my blog

Releases

No releases published

Packages

No packages published

Languages

  • JavaScript 70.1%
  • Assembly 11.9%
  • HTML 9.1%
  • Go 4.2%
  • Dockerfile 3.3%
  • Makefile 1.4%