Overview Being a Content Delivery Network (CDN) platform, sometimes you can see fractions of attacks on the wire. In this blog, we will focus on phishing websites that, while not being delivered by the Akamai platform, are referring to or...
Introduction After almost one and half year AFK, play CTF again. Vulnerability The vulnerability is easy to locate as given below. Function alloca alloccates 4*n bytes on stack, but the long-type number inserted on stack is 8-byte long. And it is easy to detect that there is something wrong. Since the variables from top to […]