Zero Day Sunset
InsanePurple TeamPwn 6+ hrs
Challenge Description / Scenario
You have a low-privileged shell on a hardened Linux system. A custom kernel module exposes an ioctl interface with a subtle use-after-free. Exploit it to get root.
Submit Flags
2 questions — answer all to complete the challenge
1000 pts
1
What is the vulnerable ioctl command?
2
Submit /root/flag.txt
Similar Challenges