\x0f

@foxTN

Flags capturer and Rubik's cube solver. Personal profile with personal opinions.

Italy
Vrijeme pridruživanja: lipanj 2011.

Tweetovi

Blokirali ste korisnika/cu @foxTN

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @foxTN

  1. proslijedio/la je Tweet
    18. sij

    z3 is a tool we see used in CTFs and and generally reverse engineering. But I just stumbled over this gamedev talk where used z3 to find bugs in the decision/dialogue trees of a game. And even generates valid savegame states with it!!!

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    9. pro 2019.

    Welcome to the stupid cyberfuture. Hey, intel, here's an idea: let users switch between the performance and security versions of the microcode, using a physical switch on the front of the PC, labeled "turbo"

    Poništi
  3. proslijedio/la je Tweet

    can somebody please confirm that this is actually happening and that I'm not just making this up

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    10. pro 2019.

    Quick recap in English: was asked to check the security of a doctors office. We found issues like unauth remote updates of a software managing patient data (the 90s are calling). When reported to the vendor, the first response was denial, then lawyers.

    Poništi
  5. proslijedio/la je Tweet

    Flight attendant: Is there a doctor on this flight? Dad: *nudging me* that should've been you Me: Not now Dad Dad: Not asking for an SRE to help, are they? Me: Dad, there's a medical emergency Flight attendant: Remain calm, we are investigating the root cause Me: HOLD UP

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet

    CTF players, bug hunters and students descended onto London to play, hack and learn. Congrats to for winning - again! :)

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    24. stu 2019.

    Almost time to get started! Just 7 days until the start of our Advent CTF. Be sure to sign up at

    Poništi
  8. proslijedio/la je Tweet
    19. stu 2019.

    We just released the challenges of this year's finals together with a short write up of the intended solutions: If anything is not clear, feel free to DM me and I can share more details about the challenges.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    31. lis 2019.

    I'm extremely proud and pleased that my ridiculous big project is now available to pre-order: I've had a couple years of sleepless nights and countless "aha!" moments putting this together. In my opinion, there is really valuable insight in each chapter.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    18. stu 2019.

    Building Secure & Reliable Systems book - 3 chapters early release!

    Poništi
  11. proslijedio/la je Tweet
    8. stu 2019.

    If there is one "security mechanism" that I wish I could BURN WITH FIRE it is password letter restrictions/requirements beyond length. It is ridiculously idiotic and EMPIRICALLY LEADS TO WORSE PASSWORDS.

    Poništi
  12. proslijedio/la je Tweet
    6. stu 2019.
    Poništi
  13. proslijedio/la je Tweet
    5. stu 2019.

    FYI: I just slightly cleaned up my RIDL exploit and added more comments to assembly, hopefully it's less magic now :) (this is my solver for 's task from Google CTF Finals, exploiting RIDL on a Skylake CPU with 2 hyperthreads, running on GCE)

    Poništi
  14. proslijedio/la je Tweet
    5. stu 2019.

    Me: “it’s really hard to get the men in meetings to notice I exist and that I know about technology” Me: *wears circuit board dress to work that’s so reflective it sets off every motion & light sensor within a mile radius* Me: “maybe this will work”

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    4. stu 2019.

    2nd time at the 2nd place at , an honor, thank you for another awesome CTF, see you next year.

    Poništi
  16. proslijedio/la je Tweet
    26. lis 2019.

    After going through TastelessCTF, i've come to the understanding that I know nothing about shellcode, can't examine binaries, cannot decrypt, and unable to successfully de-steg a file. I failed all categories. The furthest category involved pcap analysis, which I know the best of

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    4. stu 2019.

    So excited to see this work coming to the light of day. Topics near and dear to my heart everyday, reflecting the experiences we've had at Google and beyond. Thanks to Adam, Betsy, Piotr, and the many others that have contributed to telling these stories.

    Poništi
  18. proslijedio/la je Tweet
    4. stu 2019.

    Successfully building, deploying, monitoring, and maintaining systems is only possible when security and reliability are central elements in their architecture - learn about this and more at thanks to and many contributors

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    3. stu 2019.

    Thanks all for participating in and - I hope y'all had a blast! ;)

    Poništi
  20. 3. stu 2019.

    Last 8 minutes to hack! finals are almost over

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·