ChallengesPwnZero Day Sunset

Zero Day Sunset

InsanePurple TeamPwn 6+ hrs

Challenge Description / Scenario

You have a low-privileged shell on a hardened Linux system. A custom kernel module exposes an ioctl interface with a subtle use-after-free. Exploit it to get root.

Submit Flags

2 questions — answer all to complete the challenge

1000 pts
1

What is the vulnerable ioctl command?

2

Submit /root/flag.txt