miGoogle
  • Home
  • Sponsors
  • District Registration

Letssplitturtles.part02.rar Today

: By placing a magic_gadget address at a specific offset ( +0x60 ), the program was forced to execute the desired shellcode or function when it attempted to traverse to the "next" turtle. Execution & Debugging

The "Turtles" challenge involved a program that processed nested structures (turtles). Each "turtle" contained pointers to other turtles, creating a complex chain. The objective for Part 2 was to transition from the initial memory leak (achieved in Part 01) to a controlled "magic gadget" execution. Technical Analysis LetsSplitTurtles.part02.rar

: The payload specifically targeted RDX and RAX to set up the final call. : By placing a magic_gadget address at a

: The first 16 bytes of the payload were used to point the RDI register toward a "slack" space in memory. The objective for Part 2 was to transition

: Using the leak obtained previously, the payload had to account for specific register offsets. Payload Structure :

For a deep dive into the specific assembly and memory offsets used in this exploit, you can view the full technical breakdown on nickcano.com .

2025 miGoogle Conference

November 3-4, 2025
Mt. Pleasant High School
1155 S Elizabeth St.
Mt Pleasant, MI 48858

Conference Sponsors:

  • MACUL
  • Central Michigan University
  • Sowash Ventures LLC
  • Become a Corporate Sponsor!

Follow MiGoogle

Facebook
Twitter
Instagram
© 2017 MiGoogle Conference