Rezultati pretraživanja
  1. 28. pro 2018.

    Thanks to osmocombb and the whole osmocom GSM network stack components I was able to build my own GSM phone for a challenge. Any similarity with previous commercial phones is a pure coincidence. If you want to hack this thing, check out newphonewhodis and identitytheft.

  2. 3. sij 2019.

    I just wrote another blog post. This time its a write up for a its the php challenge.

  3. 30. pro 2018.

    I published my challenge sources and exploits: includes very high-level writeups for sequence and keybase

    Prikaži ovu nit
  4. 3. sij 2019.

    I just released a Writeup for the WebKid challenge of . You can find it here: Writeup for pillow will follow soon...

    Prikaži ovu nit
  5. 9. tra 2019.

    I recently published a writeup for the namespaces challenge from : Escaping a Broken Container

  6. 26. tra 2019.

    Nice writeup for a VM escape challenge which was 0day at the time: At least two unintended bugs (also 0day) were found during the CTF

  7. 12. velj 2019.

    If you enjoyed that recent runc bug you should try out my namespace challenge from the :

  8. 21. sij 2019.

    Last week I streamed myself creating a CTF video write-up. It's about the filemanager challenge from . It took ~14h and here is the result: The stream recording which serves as a making-of can be found here:

  9. 16. sij 2019.

    The vuln I found at for the VirtualBox challenge was not the 0day intended.. and it just got patched :) Turns out finding 0days in CTFs is slowly becoming a thing :P

  10. 11. sij 2019.

    If you liked my logrotate challenge, check out this bug in tmpreaper: . The vulnerable pattern was: rename("/tmp/foo", "/tmp/foo/X") Though I didn't write a full exploit I believe this should give you a root shell.

  11. 7. sij 2019.

    Cool, that means all 5 0day challenges from got solved eventually :)

  12. 2. sij 2019.

    Writeup on exploiting a typing bug (found by ) that forgot to distinguish -0 and +0. Was a super fun and difficult challenge, that I solved right before the CTF ended, just when I was about to give up. Learnt tons along the way

    Prikaži ovu nit
  13. 1. sij 2019.

    Source code and exploit of my DANCEd challenge I've created for this year's junior are now online! Thanks for hosting two awesome CTFs!

  14. 31. pro 2018.

    WriteUp of 0pack : Requirements: gdb-peda gdb ./0pack.elf break fgets start 5 x n JustATextForInputField ret 7 x n -> RAX = 1. char of flag Repeat the following step, until RAX contains no char 10 x n -> RAX = next char of flag Pass: ThisIsATriumph Flag: 35C3_ + Pass

  15. 31. pro 2018.

    Here are the sources, exploit and a short description of the solution for the 'post' challenge from

  16. 30. pro 2018.

    && were awesome! Video for my talk "Modern Windows Userspace Exploitation" is at check it out :)

    Prikaži ovu nit
  17. 30. pro 2018.

    Source code and exploits for all pwnables: :)

  18. 30. pro 2018.

    Finally solved the WebKid/chaingineering Challenge from . Writeup will follow soon…

    Prikaži ovu nit
  19. 30. pro 2018.

    My write-up for sequence (451 points) Sometimes all it takes to exploit an 0day is nothing more than wild hand-waving and guesswork :)

  20. 30. pro 2018.

    I published the source code and (commented) example exploits for my macOS browser exploitation challenges: congrats to and for solving all parts (and winning the CTF)! :)

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.