Tweetovi

Blokirali ste korisnika/cu @dsredford

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dsredford

  1. proslijedio/la je Tweet
    2. sij

    Our CTF team placed top1 @ in 2019! That's the 3rd top1 in the history of our team, and I'm really proud of our team's accomplishments! Kudos to our captain valis, our vice-captain , all the team members and all guest players that played with us!

    Poništi
  2. 2. sij
    Poništi
  3. proslijedio/la je Tweet
    29. pro 2019.

    <> congrats to Drunk Sector for finding out about their team name only 40 hours into the competition! I don't even 🤣🤣🤣

    Poništi
  4. proslijedio/la je Tweet
    18. pro 2019.

    Explains the main reason I left Google in much better words than I could come up with.

    Poništi
  5. proslijedio/la je Tweet
    18. pro 2019.

    Since we're talking about Google being less than nice towards its workers, here's a fun little story from my days there. There were two things that I really didn't like about Google at the time: The Google+ saga (realnames et al), and the IP ownership policy.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    15. pro 2019.

    the FORBIDDEN ctf tactics the pros DONT want you to know!

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    11. pro 2019.

    One unnoticed vulnerability found by Intel STORM team: Intel IGD (integarted graphic card) can read two first dwords (unencrypted of course) of cache lines belonging to Intel SGX Enclave

    Poništi
  8. proslijedio/la je Tweet

    Can Go code be unsafe and have memory corruption without importing "unsafe"? Yes, with races. Can it be unsafe without races? Yup, with insanely deep nesting: Thanks for bringing this to my attention.

    Poništi
  9. proslijedio/la je Tweet
    19. stu 2019.

    Watch out for typos in your switch/case blocks, this actually compiles (lol). In this case it lets you overflow a kernel buffer with arbitrary data. From Dragon CTF 2019.

    Poništi
  10. proslijedio/la je Tweet
    18. stu 2019.
    Poništi
  11. proslijedio/la je Tweet
    18. stu 2019.

    The BabyKernel Windows exploitation challenge from last week's is up on GitHub:

    Poništi
  12. proslijedio/la je Tweet
    16. stu 2019.

    Congratz to DragonCTF 2019 winners! TOP1: p4 () TOP2: PPP () TOP3: ALLES! () GG, WP!

    Poništi
  13. proslijedio/la je Tweet

    So uh, I made another CTF challenge with a strange custom architecture (involving non-binary bits):

    Poništi
  14. proslijedio/la je Tweet
    12. stu 2019.
    Odgovor korisnicima

    We finally released some of our PoCs and test suite (after a long embargo): (credits to Jonas Theis for the updated /etc/shadow PoC)

    Poništi
  15. 5. stu 2019.

    FYI: I just slightly cleaned up my RIDL exploit and added more comments to assembly, hopefully it's less magic now :) (this is my solver for 's task from Google CTF Finals, exploiting RIDL on a Skylake CPU with 2 hyperthreads, running on GCE)

    Poništi
  16. proslijedio/la je Tweet

    Mozilla's pdf.js has a ridiculous amount of npm dependencies on random githubs.

    Poništi
  17. proslijedio/la je Tweet

    Too many people consider this sort of things to be impossible. In fact, some statistical analysis + guesswork + staring at the code a lot and trying out many hypotheses can go a long way, and instruction sets can be recovered from much smaller samples than this.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    24. ruj 2019.

    Just published my writeup for CPU Adventure at DSCTF, wherein me, , and reverse engineered a program written for a completely unknown, custom CPU with no access to the CPU, emulator or any documentation:

    Poništi
  19. proslijedio/la je Tweet
    22. ruj 2019.

    Docker apparmor bypass: FROM ubuntu:18.04 # get rid of procfs VOLUME /proc # fake files to avoid fail on run COPY empty /proc/self/attr/exec COPY empty /proc/self/fd/4 COPY empty /proc/self/fd/5 COPY empty /proc/self/status # cmd will not have apparmor restrictions CMD YOUR_CMD

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    21. ruj 2019.

    Teaser Dragon CTF 2019 has started on time! And there are even two "first bloods" (first solves if you're new to CTFs) already - congratz to 13bd37 for solving BabyPDF and for rms!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·