<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>ECW 2023 on THALIUM</title><link>/tags/ecw-2023/</link><description>Recent content in ECW 2023 on THALIUM</description><generator>Hugo</generator><language>en-us</language><copyright>Copyright (c) 2026, all rights reserved.</copyright><lastBuildDate>Tue, 07 Nov 2023 12:00:00 +0100</lastBuildDate><atom:link href="/tags/ecw-2023/index.xml" rel="self" type="application/rss+xml"/><item><title>ECW 2023: Centralized Memory (write-up)</title><link>/posts/ecw-2023-centralized-memory-write-up/</link><pubDate>Tue, 07 Nov 2023 12:00:00 +0100</pubDate><guid>/posts/ecw-2023-centralized-memory-write-up/</guid><description>&lt;strong&gt;Centralized Memory&lt;/strong&gt; was a hard Linux pwn challenge created for the European Cyber Week CTF 2023 qualifiers. This write-up covers the intended method of exploitation through a race condition, an AES padding bug and a stack overflow.</description></item><item><title>ECW 2023: kaleidoscope (write-up)</title><link>/posts/ecw-2023-kaleidoscope-write-up/</link><pubDate>Tue, 07 Nov 2023 12:00:00 +0100</pubDate><guid>/posts/ecw-2023-kaleidoscope-write-up/</guid><description>&lt;strong&gt;kaleidoscope&lt;/strong&gt; was a hard reverse engineering challenge created for the European Cyber Week CTF 2023 qualifiers, with a focus on Windows-specific mechanisms and VM-based obfuscation.</description></item><item><title>ECW 2023: The Calculator in Shadow (write-up)</title><link>/posts/ecw-2023-the-calculator-in-shadow-write-up/</link><pubDate>Tue, 07 Nov 2023 12:00:00 +0100</pubDate><guid>/posts/ecw-2023-the-calculator-in-shadow-write-up/</guid><description>&lt;strong&gt;The Calculator in Shadow&lt;/strong&gt; was a hard pwn challenge created for the European Cyber Week CTF 2023 qualifiers. It included exploiting a RISC-V calculator running on top of a customized QEMU that featured a poorly implemented shadow stack.</description></item></channel></rss>