Tweetovi

Blokirali ste korisnika/cu @boryspop

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @boryspop

  1. proslijedio/la je Tweet
    24. sij

    Ever get a pointer to the middle of a struct? Just add the __shifted keyword to the variable's type definition!

    Poništi
  2. 2. sij
    Poništi
  3. proslijedio/la je Tweet
    29. pro 2019.

    <> congrats to Drunk Sector for finding out about their team name only 40 hours into the competition! I don't even 🤣🤣🤣

    Poništi
  4. proslijedio/la je Tweet
    29. pro 2019.

    Congratulations to for coming in first, r00timentary second, and third!

    Poništi
  5. proslijedio/la je Tweet
    11. pro 2019.

    Me: *whispers in Santa’s ear* Santa: Me: Santa: I don’t know what a “high yield 5nm lithography process” is, but I’ll see what the elves can do

    Poništi
  6. proslijedio/la je Tweet
    19. stu 2019.

    I made sandbox-RIDL and sandbox-procbox this year. In the first, you just had to write an exploit for RIDL and the second was CVE-2019-5736 with a twist. You had to overwrite /proc/1/exe in a namespace sandbox but this was only possible by racing the kernel.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    18. stu 2019.
    Poništi
  8. proslijedio/la je Tweet
    16. stu 2019.

    Congratz to DragonCTF 2019 winners! TOP1: p4 () TOP2: PPP () TOP3: ALLES! () GG, WP!

    Poništi
  9. proslijedio/la je Tweet
    3. stu 2019.

    I couldn't find a working RIDL exploit on the internet so I made it a challenge at the . 5/10 teams solved it in under 24h. I heard at least will publish an exploit soon, stay tuned ;)

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    24. lis 2019.

    The Polish Hacker scene is in dire need of more 36c3 vouchers! We only received 13 for the entirety of the country, gave some away, and now our common queue is at 30 people and we only get 4 replications per day. Anyone have some spare we could use today and immediately return?

    Poništi
  11. 22. ruj 2019.

    - send that fd to init (via unix socket - in ancillary data) - setns to that fd - race (close to 100% win-rate) ptrace on a new process entering the sandbox - overwrite its memory with shellcode - it uses vfork so main process mem is overwritten as well - read flag ;) (2/2)

    Prikaži ovu nit
    Poništi
  12. 22. ruj 2019.

    Trusted Loading 2 solution (from DragonCTF 2019 Teaser): - get a not chrooted process from stage1 (in trusted loader's ns) - symlink chroot dir to / - spawn new process in the sandbox (now not chrooted) - unshare user,pid,mount ns - mount proc, get fd for /proc/self/ns/user (1/2)

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet

    Here's a little something that I made for (now-finished) Dragon CTF 2019 Teaser by : (blackbox CPU reverse engineering) — have fun!

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    22. ruj 2019.

    The Teaser Dragon CTF 2019 is now over! TOP1: PPP TOP2: p4 TOP3: Balsn Full scoreboard: Congratz all around! If you've played our CTF, please fill out our post-CTF survey: (and don't forget to vote on CTF time) GG WP!

    Poništi
  15. proslijedio/la je Tweet
    22. ruj 2019.

    Docker apparmor bypass: FROM ubuntu:18.04 # get rid of procfs VOLUME /proc # fake files to avoid fail on run COPY empty /proc/self/attr/exec COPY empty /proc/self/fd/4 COPY empty /proc/self/fd/5 COPY empty /proc/self/status # cmd will not have apparmor restrictions CMD YOUR_CMD

    Prikaži ovu nit
    Poništi
  16. 18. ruj 2019.
    Poništi
  17. proslijedio/la je Tweet
    22. tra 2019.

    This. I’m gonna doubt your intelligence if you actually believe that breaking the law is the only respectable way of learning application security in 2019.

    Poništi
  18. proslijedio/la je Tweet
    29. ožu 2019.

    Vulncode-DB – A vulnerable code database This might become another useful tool in your security tool belt. Looking forward to hear your feedback and your potential use-cases!

    Poništi
  19. proslijedio/la je Tweet
    29. ožu 2019.
    Poništi
  20. proslijedio/la je Tweet

    After two days of fierce competition, 12 teams stood out from the Quals of TCTF 2019! Congraduations to Dragon Sector, Tea Deliverers and 217 for scooping the top 3 spots in this preliminary online contest!Looking forward to seeing u in June:)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·