Rezultati pretraživanja
  1. received the perfect rating of 100 this year. Thank you for the great feedback! We had VBox 0day, Win+Linux kernel pwns, browser exploits, super hard web challenges, and the hardest Windows pwnable we have ever exploited. Let's see if we can keep up next year.

  2. 31. pro 2017.

    Here is a video of my Blinkenlights challenge in case you wondered if I have actual hardware. Yes, I have. As always, it looks way better in real life because of the limited dynamic range of the camera sensor.

  3. 29. pro 2017.

    was absolutely amazing! Here my write up for readme_revenge pwnable :)

  4. 29. pro 2017.
  5. 8. sij 2018.

    Pretty neat write-up for a simple pwnable challenge I did for , if you are interested in learning more about some of the latest glibc allocator developments:

  6. 29. pro 2017.

    EAT, SLEEP, TUWAT, REPEAT! Thank you for the amazing @ !

  7. 29. pro 2017.
  8. 5. sij 2018.

    I made a quick writeup for my extract0r web challenge from the

  9. 30. pro 2017.

    urlstorage writeup Making ultimate exploit chain by abusing XSS + CSRF + RPO

  10. 30. pro 2017.

    Challenge files, docker environment, and my exploit for the "v9" Chromium pwnable of . Congrats to and A*0*E for solving it in time!

  11. 9. sij 2018.

    The math behind the white_russian and miner challenges of is explained in Sect. 3 of this paper: The paper does not realize that the solution for white_russian is (pretty much) just a special case of the solution for miner. 2/2

  12. 12. sij 2018.

    My beginner focused writeup of solving the morph challenge from with I did for was just published!

  13. 30. pro 2017.

    Sources & Exploits for challenges I created for the : extract0r, urlstorage & minbashmaxfun; plus my challenges.

  14. 31. pro 2017.

    Source code and exploits for all pwnables: :)

  15. 27. pro 2017.

    Think now is a good time to write a Chrome exploit? Do `nc 35.198.159.246 1337` or visit and look for the "v9" challenge =)

  16. 30. pro 2017.

    my (dirty) solutions for superblog1 and superblog2 (CSP bypass with JSONP+ES6+document.write):

  17. 29. pro 2017.

    34C3 is really hard but interesting. `minbashmaxfun` is the hardest cmd injection challenge I've ever seen.

  18. 30. pro 2017.

    Solved `minbashmaxfun` at . Great challenge, writeup @ The reference solution is much cleaner than ours, but a little hackiness is always fun at CTFs. Great work ESPR ;)

  19. 2. sij 2018.

    Here's my exploit for my heap challenge (300) of the . I solved it by overwriting (older) libc's check_action variable using a corrupted unsorted bin. This disables abort on error and gives a write-what-where primitive.

    Prikaži ovu nit
  20. 29. pro 2017.

    Man did a pretty good job this year. 34C3 CTF was a lot of fun (and super hard... like "WTF you call that easy ?!" that kind of difficulty). Can't wait to see the write-up of V9 + those kernel exploit challenges and learn some new stuff.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.