Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @dsredford
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dsredford
-
Michał Kowalczyk proslijedio/la je Tweet
Our CTF team placed top1 @ http://CTFTime.org in 2019! That's the 3rd top1 in the history of our team, and I'm really proud of our team's accomplishments! Kudos to our captain valis, our vice-captain
@dsredford, all the team members and all guest players that played with us!https://twitter.com/DragonSectorCTF/status/1212702012837629952 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Michał Kowalczyk proslijedio/la je Tweet
<
@yyyyyyy> congrats to Drunk Sector for finding out about their team name only 40 hours into the competition! I don't even

#TrolledAtCCCCTF#IDontEven#Potatospic.twitter.com/JRO4gPwPrN
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michał Kowalczyk proslijedio/la je Tweet
Explains the main reason I left Google in much better words than I could come up with.https://twitter.com/marcan42/status/1207234468928356352 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michał Kowalczyk proslijedio/la je Tweet
Since we're talking about Google being less than nice towards its workers, here's a fun little story from my days there. There were two things that I really didn't like about Google at the time: The Google+ saga (realnames et al), and the IP ownership policy.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michał Kowalczyk proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Michał Kowalczyk proslijedio/la je Tweet
One unnoticed vulnerability found by Intel STORM team: Intel IGD (integarted graphic card) can read two first dwords (unencrypted of course) of cache lines belonging to Intel SGX Enclavehttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michał Kowalczyk proslijedio/la je Tweet
Can Go code be unsafe and have memory corruption without importing "unsafe"? Yes, with races. Can it be unsafe without races? Yup, with insanely deep nesting: https://github.com/A-0-E/writeups/blob/master/googlectf-2019-finals/gomium/exp.go … Thanks
@stalkr_ for bringing this to my attention.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michał Kowalczyk proslijedio/la je Tweet
Watch out for typos in your switch/case blocks, this actually compiles (lol). In this case it lets you overflow a kernel buffer with arbitrary data. From Dragon CTF 2019.pic.twitter.com/H8mk50HBJS
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michał Kowalczyk proslijedio/la je Tweet
We've released our solution slides for the Dragon CTF 2019: https://docs.google.com/presentation/d/12TzHVUc36eOZIZxLtr13YEmHxQS5lBXrWX5jbwMZjC8/edit … See also: https://blog.dragonsector.pl/2019/11/dragon-ctf-2019-results-and-tasks.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michał Kowalczyk proslijedio/la je Tweet
The BabyKernel Windows exploitation challenge from last week's
@DragonSectorCTF is up on GitHub:https://github.com/j00ru/ctf-tasks/tree/master/Dragon%20CTF%202019/Main%20event/BabyKernel …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michał Kowalczyk proslijedio/la je Tweet
Congratz to DragonCTF 2019 winners! TOP1: p4 (
@p4_team) TOP2: PPP (@PlaidCTF) TOP3: ALLES! (@allesctf) GG, WP! https://ctftime.org/event/887 pic.twitter.com/BAE8Tz1ggg
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michał Kowalczyk proslijedio/la je Tweet
So uh, I made another CTF challenge with a strange custom architecture (involving non-binary bits):https://github.com/mwkmwkmwk/cpuadventure2 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michał Kowalczyk proslijedio/la je Tweet
We finally released some of our PoCs and
#ridl test suite (after a long embargo): https://github.com/vusec/ridl https://mdsattacks.com#mds@vu5ec (credits to Jonas Theis for the updated /etc/shadow PoC)pic.twitter.com/CD0g63qUGlHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
FYI: I just slightly cleaned up my RIDL exploit and added more comments to assembly, hopefully it's less magic now :) (this is my solver for
@_tsuro's task from Google CTF Finals, exploiting RIDL on a Skylake CPU with 2 hyperthreads, running on GCE)https://twitter.com/dsredford/status/1191171307980967937 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michał Kowalczyk proslijedio/la je Tweet
Mozilla's pdf.js has a ridiculous amount of npm dependencies on random githubs. https://gist.github.com/thestinger/b09bc3eaae051400c0acd5be5e5856b3 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michał Kowalczyk proslijedio/la je Tweet
Too many people consider this sort of things to be impossible. In fact, some statistical analysis + guesswork + staring at the code a lot and trying out many hypotheses can go a long way, and instruction sets can be recovered from much smaller samples than this.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michał Kowalczyk proslijedio/la je Tweet
Just published my writeup for CPU Adventure at DSCTF, wherein me,
@zwad3,@thebluepichu and@jay_f0xtr0t reverse engineered a program written for a completely unknown, custom CPU with no access to the CPU, emulator or any documentation:https://www.robertxiao.ca/hacking/dsctf-2019-cpu-adventure-unknown-cpu-reversing/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michał Kowalczyk proslijedio/la je Tweet
Docker apparmor bypass: FROM ubuntu:18.04 # get rid of procfs VOLUME /proc # fake files to avoid fail on run COPY empty /proc/self/attr/exec COPY empty /proc/self/fd/4 COPY empty /proc/self/fd/5 COPY empty /proc/self/status # cmd will not have apparmor restrictions CMD YOUR_CMD
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michał Kowalczyk proslijedio/la je Tweet
Teaser Dragon CTF 2019 has started on time! And there are even two "first bloods" (first solves if you're new to CTFs) already - congratz to 13bd37 for solving BabyPDF and
$wag for rms!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
1st place at
1st place at 2 CTFs
2nd place at 5 CTFs
3rd place at 5 CTFs
And also organized a well received Dragon CTF 2019!