Rating:

# Ghostbusters

Cool challenge that involved influencing the userspace stack by calling `vsyscall` syscalls (which reside at static addresses in every process).

Helpful resources:

* [Writeup from GoogleCTF](http://gmiru.com/writeups/gctf-wiki/) that uses `vsyscall` addresses as a sled into more useful functions
* [LWN article on the security implications of `vsyscall`/vDSO](https://lwn.net/Articles/446528/)

Original writeup (https://github.com/welchbj/ctf/tree/master/writeups/2020/DamCTF/ghostbusters).