honululu

@_honululu_

CTFs and research on in the SecLab at UCSB, captain of , to blame for .

Vrijeme pridruživanja: lipanj 2019.

Tweetovi

Blokirali ste korisnika/cu @_honululu_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_honululu_

  1. proslijedio/la je Tweet
    4. velj
    Odgovor korisniku/ci
    Poništi
  2. proslijedio/la je Tweet
    29. sij
    Odgovor korisnicima

    '%' and '$' do not belong in asm.

    Poništi
  3. proslijedio/la je Tweet
    28. stu 2019.

    Somehow I missed there's a whole Ph.D. thesis on symbolic abstraction: Looks pretty readable, too.

    Poništi
  4. proslijedio/la je Tweet
    19. pro 2019.
    Odgovor korisnicima

    No, I made some extensions to the work of Olm and Seidl:

    Poništi
  5. proslijedio/la je Tweet
    6. pro 2019.

    This is just in! We *might* be hosting a teaser CTF later this month of December (!) (probably somewhere around 20th). We will have some good challenges, including some written by We'll also have some easy challenges. Come try our CTF pls :)

    Poništi
  6. 8. stu 2019.
    Poništi
  7. proslijedio/la je Tweet
    14. lis 2019.

    New IDA 7.4 and Decompilers released! Changelog: - IdaPython move to Python 3 - New Local Types editor - Improved GDB support (iOS 13) - Multiple improvements in decompiler engine - Global xrefs directly in pseudocode

    Poništi
  8. proslijedio/la je Tweet
    13. lis 2019.

    Some months ago, in part because of a CFG bitmap bug (whose resolution I still haven't checked on), I got it into my head to tackle the fundamentals of Windows memory management yet again. Whatever it leads to, today's product perhaps stakes some ground: .

    Poništi
  9. proslijedio/la je Tweet
    13. lis 2019.

    GoGo PowerSQL unintended RCE solution: 1. Pollute environment variable 2. libmysqlclient will load plugin from LIBMYSQL_PLUGINS 3. But it will append annoying .so 4. Bypass by sending 512 bytes ./././ ... 5. Load the malicious plugin from /proc/self/fd/0 6. Profit 🍊

    Poništi
  10. 14. lis 2019.

    Really cool to see your exploit for BreathOfShadows, I spent all of and solved it 2 hours after it was over. In my solution I ROP to ZwCreateFile + ZwReadFile, did not think about the page tables. Amazing challenge for my first windows kernel experience, thank you!

    Poništi
  11. 25. ruj 2019.

    Can't wait to play with and Xer and our mystery fourth :). Looking forward to watching it back afterwards with commentary about our fumbles ;), thanks to and for hosting such an awesome event!

    Poništi
  12. 17. kol 2019.

    Can't wait to play, let's see if can solve a web challenge for once :D. Go easy on us senpai :)

    Poništi
  13. proslijedio/la je Tweet
    1. tra 2019.

    Attention, all you tasteful humans out there. The year has come! We have captured enough flags to share some with you; Announcing: Tasteless-CTF, Oct. 5-6 '19 - reserve the date and stay tuned, more details to come!

    Poništi
  14. 27. srp 2019.

    Excited to watch my teammate together with and in and 's new ! Let's see if the Master of pwn title helps :P

    Poništi
  15. proslijedio/la je Tweet
    24. srp 2019.

    Don't forget the 6th episode of Pwny Racing this Saturday 14:00 UTC: There might be a slight twist coming up in this episode. Spread the words to all of your hacking interested friends as well and watch the race together.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·