Tweets

You blocked @DragonSectorCTF

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @DragonSectorCTF

  1. Jan 2

    2019 was a great year for Dragon Sector! 🏆1st place at global ranking for the 2nd year in a row & 3rd time in the history of our team 🥇1st place at 2 CTFs 🥈2nd place at 5 CTFs 🥉3rd place at 5 CTFs 💻And also organized a well received Dragon CTF 2019!

    CTFTime scoreboard screenshot:
1st place: Dragon Sector (Poland)
2nd place: Balsn (Taiwan)
3rd place: Plaid Parliament of Pwning (USA)
    Undo
  2. 18 Nov 2019
    Undo
  3. 16 Nov 2019

    Congratz to DragonCTF 2019 winners! TOP1: p4 () TOP2: PPP () TOP3: ALLES! () GG, WP!

    Undo
  4. Retweeted

    So uh, I made another CTF challenge with a strange custom architecture (involving non-binary bits):

    Undo
  5. 7 Oct 2019

    If you're planning to attend Dragon CTF 2019, you might want to take a look at this post:

    Undo
  6. Retweeted
    2 Oct 2019

    I'm going live in 1.5h to showcase solutions of BabyPDF, PlayCAP and ummmfpu from 𝕿𝖊𝖆𝖘𝖊𝖗 𝕯𝖗𝖆𝖌𝖔𝖓 𝕮𝕿𝕱 2019 by . Join me at:

    Undo
  7. Retweeted
    24 Sep 2019

    Just published my writeup for CPU Adventure at DSCTF, wherein me, , and reverse engineered a program written for a completely unknown, custom CPU with no access to the CPU, emulator or any documentation:

    Undo
  8. Retweeted
    23 Sep 2019

    The "Looking glass" task of the Teaser is an MD5 collision of Protobuf via UniColl made by mlen. Write-up by

    Undo
  9. Retweeted
    23 Sep 2019
    Undo
  10. Retweeted
    23 Sep 2019

    Mostly complete disassembler for the CPU Adventure problem. Kudos to for doing most of the reversing and for solving it

    Undo
  11. Retweeted
    23 Sep 2019

    I've released the sources to my Teaser task `rms` (and `rms-fixed`):

    Undo
  12. Retweeted
    23 Sep 2019

    I uploaded my BadType challenge from last weekend's Dragon CTF Teaser on GitHub. It's a medium-difficulty RE task for Windows x64 (worth 400 pts), solved by 9⃣ teams during the competition.

    Show this thread
    Undo
  13. Retweeted
    22 Sep 2019

    My exploit on `rms-fixed` challenge caused by sort of race conditional while resolving addr of the host.

    Undo
  14. Retweeted
    22 Sep 2019
    Undo
  15. Retweeted
    22 Sep 2019

    So long since my last blog post... Here's my writeup for Dragon CTF Teaser 2019 "rms" (and "rms-fixed"), enjoy!

    Undo
  16. Retweeted
    22 Sep 2019

    I've pushed my tasks (with sources / solvers) from Teaser Dragon CTF 2019 to my github: BabyPDF PlayCAP ummmfpu

    Undo
  17. Retweeted

    Here's a little something that I made for (now-finished) Dragon CTF 2019 Teaser by : (blackbox CPU reverse engineering) — have fun!

    Show this thread
    Undo
  18. Retweeted
    22 Sep 2019
    Undo
  19. Retweeted
    22 Sep 2019

    Docker apparmor bypass: FROM ubuntu:18.04 # get rid of procfs VOLUME /proc # fake files to avoid fail on run COPY empty /proc/self/attr/exec COPY empty /proc/self/fd/4 COPY empty /proc/self/fd/5 COPY empty /proc/self/status # cmd will not have apparmor restrictions CMD YOUR_CMD

    Show this thread
    Undo
  20. 22 Sep 2019

    The Teaser Dragon CTF 2019 is now over! TOP1: PPP TOP2: p4 TOP3: Balsn Full scoreboard: Congratz all around! If you've played our CTF, please fill out our post-CTF survey: (and don't forget to vote on CTF time) GG WP!

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·