Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @boryspop
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @boryspop
-
Borys Popławski proslijedio/la je Tweet
#idatips Ever get a pointer to the middle of a struct? Just add the __shifted keyword to the variable's type definition!pic.twitter.com/zvYs3dTU7w
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Should we try 3rd year in a row? ;)https://twitter.com/DragonSectorCTF/status/1212702012837629952 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Borys Popławski proslijedio/la je Tweet
<
@yyyyyyy> congrats to Drunk Sector for finding out about their team name only 40 hours into the competition! I don't even

#TrolledAtCCCCTF#IDontEven#Potatospic.twitter.com/JRO4gPwPrN
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Borys Popławski proslijedio/la je Tweet
Congratulations to
@pastenctf for coming in first, r00timentary second, and@DragonSectorCTF third! https://2019.ctf.link/public/scoreboard/max …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Borys Popławski proslijedio/la je Tweet
Me: *whispers in Santa’s ear* Santa: Me: Santa: I don’t know what a “high yield 5nm lithography process” is, but I’ll see what the elves can do
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Borys Popławski proslijedio/la je Tweet
I made sandbox-RIDL and sandbox-procbox this year. In the first, you just had to write an exploit for RIDL and the second was CVE-2019-5736 with a twist. You had to overwrite /proc/1/exe in a namespace sandbox but this was only possible by racing the kernel.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Borys Popławski proslijedio/la je Tweet
We've released our solution slides for the Dragon CTF 2019: https://docs.google.com/presentation/d/12TzHVUc36eOZIZxLtr13YEmHxQS5lBXrWX5jbwMZjC8/edit … See also: https://blog.dragonsector.pl/2019/11/dragon-ctf-2019-results-and-tasks.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Borys Popławski proslijedio/la je Tweet
Congratz to DragonCTF 2019 winners! TOP1: p4 (
@p4_team) TOP2: PPP (@PlaidCTF) TOP3: ALLES! (@allesctf) GG, WP! https://ctftime.org/event/887 pic.twitter.com/BAE8Tz1ggg
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Borys Popławski proslijedio/la je Tweet
I couldn't find a working RIDL exploit on the internet so I made it a challenge at the
#GoogleCTF. 5/10 teams solved it in under 24h. I heard at least@dsredford will publish an exploit soon, stay tuned ;)Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Borys Popławski proslijedio/la je Tweet
The Polish Hacker scene is in dire need of more 36c3 vouchers! We only received 13 for the entirety of the country, gave some away, and now our common queue is at 30 people and we only get 4 replications per day. Anyone have some spare we could use today and immediately return?
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
- send that fd to init (via unix socket - in ancillary data) - setns to that fd - race (close to 100% win-rate) ptrace on a new process entering the sandbox - overwrite its memory with shellcode - it uses vfork so main process mem is overwritten as well - read flag ;) (2/2)
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Trusted Loading 2 solution (from DragonCTF 2019 Teaser): - get a not chrooted process from stage1 (in trusted loader's ns) - symlink chroot dir to / - spawn new process in the sandbox (now not chrooted) - unshare user,pid,mount ns - mount proc, get fd for /proc/self/ns/user (1/2)
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Borys Popławski proslijedio/la je Tweet
Here's a little something that I made for (now-finished) Dragon CTF 2019 Teaser by
@DragonSectorCTF : https://github.com/koriakin/cpuadventure/ … (blackbox CPU reverse engineering) — have fun!Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Borys Popławski proslijedio/la je Tweet
The Teaser Dragon CTF 2019 is now over! TOP1: PPP TOP2: p4 TOP3: Balsn Full scoreboard: https://ctf.dragonsector.pl/?scoreboard Congratz all around! If you've played our CTF, please fill out our post-CTF survey: https://docs.google.com/forms/d/1ZYOHteIf4AbXI7XpmK_gwXG2DSc2gdNCRZb-xqvJj-I … (and don't forget to vote on CTF time) GG WP!pic.twitter.com/mB0XzFHpXZ
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Borys Popławski proslijedio/la je Tweet
Docker apparmor bypass: FROM ubuntu:18.04 # get rid of procfs VOLUME /proc # fake files to avoid fail on run COPY empty /proc/self/attr/exec COPY empty /proc/self/fd/4 COPY empty /proc/self/fd/5 COPY empty /proc/self/status # cmd will not have apparmor restrictions CMD YOUR_CMD
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Join us this weekend at Dragon CTF!https://twitter.com/DragonSectorCTF/status/1174241317150502912 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Borys Popławski proslijedio/la je Tweet
This. I’m gonna doubt your intelligence if you actually believe that breaking the law is the only respectable way of learning application security in 2019.https://twitter.com/thegrugq/status/1119762755223822336 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Borys Popławski proslijedio/la je Tweet
Vulncode-DB – A vulnerable code database https://www.evonide.com/vulncode-db-a-vulnerable-code-database/ … This might become another useful tool in your security tool belt. Looking forward to hear your feedback and your potential use-cases!pic.twitter.com/hmGhVOaaS7
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Borys Popławski proslijedio/la je Tweet
CCC CTF is the new Pwn2Ownhttps://twitter.com/_niklasb/status/1111624505615675392 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Borys Popławski proslijedio/la je Tweet
After two days of fierce competition, 12 teams stood out from the Quals of TCTF 2019! Congraduations to Dragon Sector, Tea Deliverers and 217 for scooping the top 3 spots in this preliminary online contest!Looking forward to seeing u in June:)pic.twitter.com/VRzPIoY2Cy
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
1st place at
1st place at 2 CTFs
2nd place at 5 CTFs
3rd place at 5 CTFs
And also organized a well received Dragon CTF 2019!