go for pwn
Hi, in this page, I'll explain the attack surface of go from point of pwn.
June 2025, in IERAE CTF 2025, I provided a challenge named gocha-go.
Please refer to author's writeup: https://gmo-cybersecurity.com/blog/ierae-ctf-2025-writeup-pwn/
Go routine in low layer
Heap allocation in low layer
Type
Memory corruption
Mitigation
Critical objects
Last modified: 04 November 2025