Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's cool seeing other people's attempts to extract the key in my return buffer.

It's like multiplayer microcorruption.com



Which, FWIW, is in the works.


Please please please email out to past participants when it is available, the first one was amazing amounts of fun.


The new one is b-a-n-a-n-a-s.


What do you mean "multiplayer"?

In the spirit of this challenge? A single exploitable endpoint where any number of N people are to go at the same implementation?

You can't tease this hard, man.

Also, Friday launch? :)


Care to post more info about it?


This is fun, indeed.

Has anyone already made a patch for this bug, where the lib returns random data instead of actual heap chunks?


Irony would be such a patch leaking information about the state of any random number generator leading to more easily guessable session keys or the like.

(Of course, creating suitable fake data with a separate PNRG to avoid this would be pretty easy.)




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: