<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>PWN on k1nt4r0u's site</title><link>https://blog.k1nt4r0u.site/tags/pwn/</link><description>Recent content in PWN on k1nt4r0u's site</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>Copyright (c) k1nt4r0u</copyright><lastBuildDate>Mon, 27 Apr 2026 14:17:36 +0700</lastBuildDate><atom:link href="https://blog.k1nt4r0u.site/tags/pwn/index.xml" rel="self" type="application/rss+xml"/><item><title>Throughthewall</title><link>https://blog.k1nt4r0u.site/writeups/b01lersctf/throughthewall/writeup/</link><pubDate>Mon, 27 Apr 2026 14:17:36 +0700</pubDate><guid>https://blog.k1nt4r0u.site/writeups/b01lersctf/throughthewall/writeup/</guid><description>&lt;ul&gt;
&lt;li&gt;Event: b01lers CTF 2026&lt;/li&gt;
&lt;li&gt;Category: &lt;code&gt;pwn&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Challenge: &lt;code&gt;pwn/throughthewall&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Files: &lt;code&gt;bzImage&lt;/code&gt;, &lt;code&gt;initramfs.cpio.gz&lt;/code&gt;, &lt;code&gt;start.sh&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Remote: &lt;code&gt;ncat --ssl throughthewall.opus4-7.b01le.rs 8443&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Flag: &lt;code&gt;bctf{spray_those_dirty_pipes}&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This challenge was a kernel pwn packaged as a bootable QEMU image. The archive gave a kernel, an initramfs, and a launcher script. The remote service wrapped the same VM behind TLS and a proof-of-work gate, then dropped us into a BusyBox shell as the unprivileged &lt;code&gt;ctf&lt;/code&gt; user. The only real goal was to turn that shell into root and read &lt;code&gt;/flag.txt&lt;/code&gt;.&lt;/p&gt;</description></item></channel></rss>