Skip to content

Latest commit

 

History

History
27 lines (16 loc) · 870 Bytes

README.md

File metadata and controls

27 lines (16 loc) · 870 Bytes

Google CTF 2020 Teleport

Exploit code for the Chromium exploitation challenge teleport at Google CTF 2020

Challenge files

As the time of writing, you can find the challenge files on Google CTF website or this original attachment link

Building

  • Extract the challenge zip to ./chall
  • Docker build

Running

  • Serve HTTPS (because of service worker)

Hacking notes

make all to build the shellcodes

The server code is in main.go. Line 30, 36 are for HTTPS, HTTP serving, respectively

cert.pem and key.pem are needed for HTTPS hosting.

Writeup

Checkout my blog