Tags: glibc pwn xor rop 

Rating:

### TL;DR

woogie-boogie is a dynamic non-stripped binary pwn challenge that exploits a xor swap with an OOB vulnerability, similar to boogie-woogie from dice ctf 2024.

First we use the OOB vulnerability to leak ASLR values and loop back to `_start`, we then use some xor magic to change the LSB byte of an old stack ptr to create a write gadget and ROP with a two gadget to get RCE and leak the flag (exploit at the end).

There were only 3 solves during the CTF with at least 2 of them being unintended solutions (including mine). The [Official Writeup](https://enzo.run/posts/lactf2024/) exploits line buffering instead and is a worthwhile read.

### [more ...](https://www.gfelber.dev/writeups/old/la_ctf_2024_woogie_boogie.md/)

Original writeup (https://www.gfelber.dev/writeups/old/la_ctf_2024_woogie_boogie.md/).