-
-
Here is a video of my
#34C3CTF Blinkenlights challenge in case you wondered if I have actual hardware. Yes, I have. As always, it looks way better in real life because of the limited dynamic range of the camera sensor. pic.twitter.com/PgWfQzwE90 -
#34c3ctf was absolutely amazing! Here https://github.com/r00ta/myWriteUps/tree/master/34C32017/pwn_readme_revenge … my write up for readme_revenge pwnable :)#fuffateam -
Pretty neat write-up for a simple pwnable challenge I did for
#34c3ctf, if you are interested in learning more about some of the latest glibc allocator developments: http://blog.rh0gue.com/2018-01-05-34c3ctf-simplegc/ … -
EAT, SLEEP, TUWAT, REPEAT!
@EatSleepPwnRpt Thank you for the amazing#34c3ctf @#34c3 !pic.twitter.com/rqwFLq0tLZ
-
-
I made a quick writeup for my extract0r web challenge from the
#34c3ctf https://github.com/eboda/34c3ctf/tree/master/extract0r … -
#34c3ctf urlstorage writeup https://l4w.io/2017/12/34c3-ctf-2017-urlstorage-writeup/ … Making ultimate exploit chain by abusing XSS + CSRF + RPO -
Challenge files, docker environment, and my exploit for the "v9" Chromium pwnable of
#34c3ctf. Congrats to@itszn13 and A*0*E for solving it in time! https://github.com/saelo/v9#34C3 -
The math behind the white_russian and miner challenges of
#34c3ctf is explained in Sect. 3 of this paper: https://eprint.iacr.org/2017/095.pdf The paper does not realize that the solution for white_russian is (pretty much) just a special case of the solution for miner. 2/2 -
My beginner focused writeup of solving the morph challenge from
#34C3CTF with@radareorg I did for@SIGFLAG_CTF was just published!https://www.sigflag.at/blog/2017/writeup-34c3ctf-m0rph/ … -
Sources & Exploits for challenges I created for the
#34c3ctf: extract0r, urlstorage & minbashmaxfun; plus my#junior34c3ctf challenges. https://github.com/eboda/34c3ctf -
Source code and exploits for all
#junior34c3ctf pwnables: https://github.com/tharina/34c3ctf#34c3ctf#34c3ِ :) -
Think now is a good time to write a Chrome exploit? Do `nc 35.198.159.246 1337` or visit https://34c3ctf.ccc.ac/challenges/ and look for the "v9" challenge =)
#34C3CTF#34C3 -
my (dirty) solutions for superblog1 and superblog2
#34c3ctf (CSP bypass with JSONP+ES6+document.write): https://gist.github.com/cgvwzq/2d875cb4bd752a99ca239e6ffe64f849 … -
34C3 is really hard but interesting. `minbashmaxfun` is the hardest cmd injection challenge I've ever seen.
#34c3ctf -
Solved `minbashmaxfun` at
#34c3ctf. Great challenge, writeup @ http://hack.more.systems The reference solution is much cleaner than ours, but a little hackiness is always fun at CTFs. Great work ESPR ;)#34c3 -
Here's my exploit for my heap challenge (300) of the
#34c3ctf. I solved it by overwriting (older) libc's check_action variable using a corrupted unsorted bin. This disables abort on error and gives a write-what-where primitive. https://gist.github.com/sroettger/591b355b50f7f28f99b27ca6194681ad …Prikaži ovu nit -
Man
@EatSleepPwnRpt did a pretty good job this year. 34C3 CTF was a lot of fun (and super hard... like "WTF you call that easy ?!" that kind of difficulty). Can't wait to see the write-up of V9 + those kernel exploit challenges and learn some new stuff.#34c3#34c3ctf
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.