0xdf

@0xdf_

CTF Addict | Thoughts are my own

Vrijeme pridruživanja: siječanj 2015.

Tweetovi

Blokirali ste korisnika/cu @0xdf_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xdf_

  1. proslijedio/la je Tweet
    4. velj
    Poništi
  2. proslijedio/la je Tweet
    1. velj
    Poništi
  3. 1. velj

    RE just retired from . As the creator of the box, I tried to bring phishing/macro obfuscation concepts to the initial access. The intended privescs were the WinRar ACE file exploit, and XXE in Ghidra. I'll show two unintended privescs too.

    Poništi
  4. 29. sij
    Poništi
  5. 25. sij

    AI just retired from HTB. It was a neat theme exploiting an AI / smart home like device using audio to perform an SQL injection. Then I'll use Java Debug to escalate to root.

    Poništi
  6. proslijedio/la je Tweet
    22. sij
    Odgovor korisniku/ci

    I heard 7Zip ate 9Zip

    Poništi
  7. 23. sij
    Poništi
  8. 22. sij

    Haven't had a chance to play with this, but does good stuff, so I'm looking forward to it.

    Tweet je nedostupan.
    Poništi
  9. 21. sij

    I just added the challenge binaries where I could for anyone interesting in playing around with these challenges on their own.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    21. sij

    made an RSS feed of the comics I post on Twitter here:

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    17. pro 2017.

    Learned this a while ago in 's dojo. Write .LOG in the first line of a file. Inserts a timestamp each time the file is opened. I just leave this here...

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    13. sij

    Every manager should be doing weekly or biweekly 1-1s with their team. Make sure the space is used to check in with your employees and *explicitly* ask them for feedback and radical candor. You’ll surface and address problems while they’re still small.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    18. sij

    Super helpful presentation for people looking at possible uses: from

    Prikaži ovu nit
    Poništi
  14. 18. sij

    Player from required enumeration and several interesting exploits to slowly build a full shell. Root was a good chance to play with PHP deserialization. There were several alternative paths as well.

    Poništi
  15. 14. sij

    Just posted my writeup for . I got a late start this year, but was glad I caught up, as it was a lot of fun. Thanks to and the entire Counterhack team for another great challenge.

    Poništi
  16. 11. sij

    Bitlab from was an opportunity to play with CICD, and to do some simple windows RE / debugging. In Beyond Root, I'll show an alternative path from www-data to root, and look at how the exe mis-calls `GetUsernameW`.

    Poništi
  17. 9. sij

    Everytime someone tells me they found some value in something I've written, it absolutely makes my day. I'm not a new years resolution person, but I am resolving to try to tell people when I find something they did useful. 30 seconds can really make someone else feel great.

    Poništi
  18. proslijedio/la je Tweet
    4. sij

    OSCP Review, Resources, and Tips Hy Guys, I have got lots DMs relates review and preparation. So now I'll try to cover important points in this short OSCP review. P.S: I'm noob and this review is based on my experience and methodology in OSCP. (1/18)

    Prikaži ovu nit
    Poništi
  19. 4. sij

    Craft from was a super fun, medium level box that involved pulling together information from various containers at each step. In Beyond Root, I'll look at my failed attempts to crack the JWT.

    Poništi
  20. 1. sij
    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·