Adam Iwaniuk

@adam_iwaniuk

Cybersecurity

Warszawa, Polska
Joined February 2018

Tweets

You blocked @adam_iwaniuk

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @adam_iwaniuk

  1. Retweeted
    Jan 2

    2019 was a great year for Dragon Sector! 🏆1st place at global ranking for the 2nd year in a row & 3rd time in the history of our team 🥇1st place at 2 CTFs 🥈2nd place at 5 CTFs 🥉3rd place at 5 CTFs 💻And also organized a well received Dragon CTF 2019!

    CTFTime scoreboard screenshot:
1st place: Dragon Sector (Poland)
2nd place: Balsn (Taiwan)
3rd place: Plaid Parliament of Pwning (USA)
    Undo
  2. Retweeted
    18 Nov 2019
    Undo
  3. Retweeted
    16 Nov 2019

    Congratz to DragonCTF 2019 winners! TOP1: p4 () TOP2: PPP () TOP3: ALLES! () GG, WP!

    Undo
  4. Retweeted
    22 Sep 2019
    Replying to

    Our writeup/bug report for the AppArmor bypass:

    Undo
  5. Retweeted
    22 Sep 2019

    Trusted Loading 2 solution (from DragonCTF 2019 Teaser): - get a not chrooted process from stage1 (in trusted loader's ns) - symlink chroot dir to / - spawn new process in the sandbox (now not chrooted) - unshare user,pid,mount ns - mount proc, get fd for /proc/self/ns/user (1/2)

    Show this thread
    Undo
  6. Retweeted

    Here's a little something that I made for (now-finished) Dragon CTF 2019 Teaser by : (blackbox CPU reverse engineering) — have fun!

    Show this thread
    Undo
  7. 22 Sep 2019

    It was intended solution to one of the challenges in DragonCTF organized by this weekend. It was solved by one team, congratulations!

    Show this thread
    Undo
  8. 22 Sep 2019

    Docker apparmor bypass: FROM ubuntu:18.04 # get rid of procfs VOLUME /proc # fake files to avoid fail on run COPY empty /proc/self/attr/exec COPY empty /proc/self/fd/4 COPY empty /proc/self/fd/5 COPY empty /proc/self/status # cmd will not have apparmor restrictions CMD YOUR_CMD

    Show this thread
    Undo
  9. Retweeted
    18 Sep 2019

    Teaser Dragon CTF 2019 is taking place this weekend! Sat, 21 Sept. 2019, 12:00 UTC — Sun, 22 Sept. 2019, 12:00 UTC Format: online, jeopardy, team-based (no size limit), teaser, ranked 𝑯𝒂𝒗𝒆 𝑭𝒖𝒏 𝑮𝒐𝒐𝒅 𝑳𝒖𝒄𝒌! (1/4)

    Show this thread
    Undo
  10. Retweeted
    29 Mar 2019
    Undo
  11. Retweeted
    12 Feb 2019

    Check out our blog post about research and I did that lead to CVE-2019-5736!

    Undo
  12. Retweeted
    12 Feb 2019

    If you enjoyed that recent runc bug you should try out my namespace challenge from the :

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·