Tweetovi

Blokirali ste korisnika/cu @DragonSectorCTF

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @DragonSectorCTF

  1. 2. sij

    2019 was a great year for Dragon Sector! 🏆1st place at global ranking for the 2nd year in a row & 3rd time in the history of our team 🥇1st place at 2 CTFs 🥈2nd place at 5 CTFs 🥉3rd place at 5 CTFs 💻And also organized a well received Dragon CTF 2019!

    CTFTime scoreboard screenshot:
1st place: Dragon Sector (Poland)
2nd place: Balsn (Taiwan)
3rd place: Plaid Parliament of Pwning (USA)
    Poništi
  2. 18. stu 2019.
    Poništi
  3. 16. stu 2019.

    Congratz to DragonCTF 2019 winners! TOP1: p4 () TOP2: PPP () TOP3: ALLES! () GG, WP!

    Poništi
  4. proslijedio/la je Tweet

    So uh, I made another CTF challenge with a strange custom architecture (involving non-binary bits):

    Poništi
  5. 7. lis 2019.

    If you're planning to attend Dragon CTF 2019, you might want to take a look at this post:

    Poništi
  6. proslijedio/la je Tweet
    2. lis 2019.

    I'm going live in 1.5h to showcase solutions of BabyPDF, PlayCAP and ummmfpu from 𝕿𝖊𝖆𝖘𝖊𝖗 𝕯𝖗𝖆𝖌𝖔𝖓 𝕮𝕿𝕱 2019 by . Join me at:

    Poništi
  7. proslijedio/la je Tweet
    24. ruj 2019.

    Just published my writeup for CPU Adventure at DSCTF, wherein me, , and reverse engineered a program written for a completely unknown, custom CPU with no access to the CPU, emulator or any documentation:

    Poništi
  8. proslijedio/la je Tweet
    23. ruj 2019.

    The "Looking glass" task of the Teaser is an MD5 collision of Protobuf via UniColl made by mlen. Write-up by

    Poništi
  9. proslijedio/la je Tweet
    23. ruj 2019.
    Poništi
  10. proslijedio/la je Tweet
    23. ruj 2019.

    Mostly complete disassembler for the CPU Adventure problem. Kudos to for doing most of the reversing and for solving it

    Poništi
  11. proslijedio/la je Tweet
    23. ruj 2019.

    I've released the sources to my Teaser task `rms` (and `rms-fixed`):

    Poništi
  12. proslijedio/la je Tweet
    23. ruj 2019.

    I uploaded my BadType challenge from last weekend's Dragon CTF Teaser on GitHub. It's a medium-difficulty RE task for Windows x64 (worth 400 pts), solved by 9⃣ teams during the competition.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    22. ruj 2019.

    My exploit on `rms-fixed` challenge caused by sort of race conditional while resolving addr of the host.

    Poništi
  14. proslijedio/la je Tweet
    22. ruj 2019.
    Poništi
  15. proslijedio/la je Tweet
    22. ruj 2019.

    So long since my last blog post... Here's my writeup for Dragon CTF Teaser 2019 "rms" (and "rms-fixed"), enjoy!

    Poništi
  16. proslijedio/la je Tweet
    22. ruj 2019.

    I've pushed my tasks (with sources / solvers) from Teaser Dragon CTF 2019 to my github: BabyPDF PlayCAP ummmfpu

    Poništi
  17. proslijedio/la je Tweet

    Here's a little something that I made for (now-finished) Dragon CTF 2019 Teaser by : (blackbox CPU reverse engineering) — have fun!

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    22. ruj 2019.
    Poništi
  19. proslijedio/la je Tweet
    22. ruj 2019.

    Docker apparmor bypass: FROM ubuntu:18.04 # get rid of procfs VOLUME /proc # fake files to avoid fail on run COPY empty /proc/self/attr/exec COPY empty /proc/self/fd/4 COPY empty /proc/self/fd/5 COPY empty /proc/self/status # cmd will not have apparmor restrictions CMD YOUR_CMD

    Prikaži ovu nit
    Poništi
  20. 22. ruj 2019.

    The Teaser Dragon CTF 2019 is now over! TOP1: PPP TOP2: p4 TOP3: Balsn Full scoreboard: Congratz all around! If you've played our CTF, please fill out our post-CTF survey: (and don't forget to vote on CTF time) GG WP!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·