Andrea Biondo @ 36C3

@anbiondo

Turning drinks into segfaults. MSc student in CS at . CTF player with and .

Joined February 2017

Tweets

You blocked @anbiondo

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @anbiondo

  1. was a blast! Here with the crew we are toasting in honor of these amazing 4 days. Cheers to all old and new friends here, see u next year/defcon/somewhere!

    Undo
  2. 15 Dec 2019

    the FORBIDDEN ctf tactics the pros DONT want you to know!

    Show this thread
    Undo
  3. 24 Nov 2019

    I'm still trying to understand how to exploit "engine" from yesterday's . Found the stack overflow, but no leak (collected_pieces was spilled to the stack, so no retaddr LSB overwrite either). Reading short in check_fuel was throwing.

    Undo
  4. 17 Oct 2019

    3rd place in HITB PRO CTF! GG and thanks for the prize ;)

    Undo
  5. 2nd place for Team Italy 🇮🇹 @ !!!!

    Undo
  6. 22 Sep 2019

    So long since my last blog post... Here's my writeup for Dragon CTF Teaser 2019 "rms" (and "rms-fixed"), enjoy!

    Undo
  7. 15 Aug 2019

    New talk: we’re talking about device identifiers in Linux and Android that somehow also leak the kernel address in KASLR and thus allows a bypass and I’m just like:

    Show this thread
    Undo
  8. 14 Aug 2019

    An awesome thesis ('s) on firmware : "Coverage-guided fuzzing of embedded firmware with avatar". PDF download link:

    Undo
  9. 12 Aug 2019

    After enough hours of sleep it's time to announce that we got the 5th place at CTF as the best European team! Congrats to PPP () for collecting more black badges this year and hosting us at the after-party, you guys are awesome! 🚩

    Show this thread
    Undo
  10. 12 Aug 2019

    We survived CTF with the fine chefs of ! 🍝 Crazy nice 5th place this year 🚩 amazing game, thanks & props to the champions

    , , and 3 others
    Undo
  11. 8 Aug 2019

    Getting ready for the game🚩 Tomorrow is the big day!

    Undo
  12. 4 Aug 2019

    It's due time to thank all the people that supported our crowdfunding campaign so far :) you can still help us at

    Undo
  13. 28 Jul 2019

    my high school maths teacher always said we needed to memorise things because "you won't carry a calculator around with you in the real world" well JOKE'S ON YOU MRS WALSH not only do I have a smartphone but my friend just emailed me this neat Word doc that opens a calculator

    Undo
  14. I wrote a small blogpost with technical details and an evaluation of the QEMU CompareCoverage instrumentation that I introduced in afl ++. I have also described the future steps, feel free to contribute :)

    Undo
  15. 27 Jun 2019

    Some of you asked to contribute individually to our funding campaign for 27 ctf. No sooner said than done! We now have a , send us to Vegas! <3

    Show this thread
    Undo
  16. 24 Jun 2019

    That's very similar to the heap massage I was doing :( oh well, gg!

    Undo
  17. 24 Jun 2019

    Played some yesterday on the Chrome pwnable. Wanted to reclaim the UAF being with another being to bump the std::string for leak + AARW (after further corruption), but had trouble with reclaiming due to Mojo temporaries in the same tcmalloc size class. Any insight?

    Undo
  18. 17 Jun 2019

    We will be at DEF CON CTF also this year. We are looking for sponsors to make it happen!

    Undo
  19. Details on CVE-2019-0546 from : Visual C++ compiler bug affecting Visual Studio 2015 & '17. Quick PoC: void f1() { int y=1; [&](){ __asm { mov y,0xdeadbef3 } }(); } int main() { volatile int r=1; void(*f)()=f1; f(); return r; }

    Undo
  20. So I wrote this very dumb based obfuscator which uses OpenSSL and super slow modular exponentiation/RSA lol

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·