-
Thanks to osmocombb and the whole osmocom GSM network stack components I was able to build my own GSM phone for a
#35c3ctf challenge. Any similarity with previous commercial phones is a pure coincidence. If you want to hack this thing, check out newphonewhodis and identitytheft. pic.twitter.com/M14zBg6FeB -
I just wrote another blog post. This time its a write up for a
#35c3CTF its the php challenge. https://rayoflightz.github.io/writeup/web/2019/01/03/35c3-php-writeup.html …@EatSleepPwnRpt -
I published my
#35c3ctf challenge sources and exploits: https://github.com/niklasb/35c3ctf-challs/ … includes very high-level writeups for sequence and keybasePrikaži ovu nit -
I just released a Writeup for the WebKid challenge of
#35C3CTF. You can find it here: https://github.com/LinusHenze/35C3_Writeups/blob/master/WebKid/README.md … Writeup for pillow will follow soon...Prikaži ovu nit -
I recently published a writeup for the namespaces challenge from
#35C3CTF: Escaping a Broken Container https://blog.perfect.blue/namespaces-35c3ctf … -
Nice writeup for a
#35c3ctf VM escape challenge which was 0day at the time: https://twitter.com/theflow0/status/1121803725385846790 … At least two unintended bugs (also 0day) were found during the CTF
-
If you enjoyed that recent runc bug you should try out my namespace challenge from the
#35c3ctf: https://35c3ctf.ccc.ac/uploads/namespaces-a4b1ac039830f7c430660bc155dd2099.tar … -
Last week I streamed myself creating a CTF video write-up. It's about the filemanager challenge from
#35c3ctf. It took ~14h and here is the result: https://www.youtube.com/watch?v=HcrQy0C-hEA … The stream recording which serves as a making-of can be found here:https://www.youtube.com/watch?v=VI5OLNHf_Sc … -
The vuln I found at
#35c3ctf for the VirtualBox challenge was not the 0day@_niklasb intended.. and it just got patched :) Turns out finding 0days in CTFs is slowly becoming a thing :Ppic.twitter.com/jZ2UdvyTuK
-
If you liked my logrotate
#35c3ctf challenge, check out this bug in tmpreaper: https://www.debian.org/security/2019/dsa-4365 …. The vulnerable pattern was: rename("/tmp/foo", "/tmp/foo/X") Though I didn't write a full exploit I believe this should give you a root shell. -
Cool, that means all 5 0day challenges from
#35C3CTF got solved eventually :) https://twitter.com/ronenshh/status/1082349196387250179 … -
Writeup on exploiting a typing bug (found by
@_tsuro) that forgot to distinguish -0 and +0. Was a super fun and difficult challenge, that I solved right before the CTF ended, just when I was about to give up. Learnt tons along the way#35C3CTF#krautflarehttps://www.jaybosamiya.com/blog/2019/01/02/krautflare/ …Prikaži ovu nit -
Source code and exploit of my DANCEd challenge I've created for this year's junior
#35c3ctf are now online! Thanks@EatSleepPwnRpt for hosting two awesome CTFs!#35c3https://github.com/pr0me/35c3ctf-DANCEd … -
WriteUp of 0pack
#35C3CTF: Requirements: gdb-peda gdb ./0pack.elf break fgets start 5 x n JustATextForInputField ret 7 x n -> RAX = 1. char of flag Repeat the following step, until RAX contains no char 10 x n -> RAX = next char of flag Pass: ThisIsATriumph Flag: 35C3_ + Pass -
Here are the sources, exploit and a short description of the solution for the 'post' challenge from
#35c3ctf https://github.com/eboda/35c3 -
#35c3ctf &#c3 were awesome! Video for my talk "Modern Windows Userspace Exploitation" is at https://www.youtube.com/watch?v=kg0J8nRIAhk … check it out :)Prikaži ovu nit -
Source code and exploits for all
#junior35c3ctf pwnables: https://github.com/tharina/35c3ctf#35c3ctf#35c3 :) -
Finally solved the WebKid/chaingineering Challenge from
#35C3CTF. Writeup will follow soon… pic.twitter.com/nv8a2X2ZH0
Prikaži ovu nit -
My write-up for sequence (451 points) Sometimes all it takes to exploit an 0day is nothing more than wild hand-waving and guesswork :)
#35c3ctf@5BCCTFhttps://github.com/yannayl/ctf-writeups/blob/master/2018/ccc/sequence/README.md … -
I published the source code and (commented) example exploits for my
#35C3CTF macOS browser exploitation challenges: https://github.com/saelo/35c3ctf congrats to@qwertyoruiopz and@i41nbeer for solving all parts (and winning the CTF)! :)#35c3https://twitter.com/5aelo/status/1078386061615734784 …
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.