Rezultati pretraživanja
  1. 28. pro 2018.

    Thanks to osmocombb and the whole osmocom GSM network stack components I was able to build my own GSM phone for a challenge. Any similarity with previous commercial phones is a pure coincidence. If you want to hack this thing, check out newphonewhodis and identitytheft.

  2. 3. sij 2019.

    I just wrote another blog post. This time its a write up for a its the php challenge.

  3. 30. pro 2018.

    I published my challenge sources and exploits: includes very high-level writeups for sequence and keybase

    Prikaži ovu nit
  4. 3. sij 2019.

    I just released a Writeup for the WebKid challenge of . You can find it here: Writeup for pillow will follow soon...

    Prikaži ovu nit
  5. 9. tra 2019.

    I recently published a writeup for the namespaces challenge from : Escaping a Broken Container

  6. 31. pro 2018.

    WriteUp of 0pack : Requirements: gdb-peda gdb ./0pack.elf break fgets start 5 x n JustATextForInputField ret 7 x n -> RAX = 1. char of flag Repeat the following step, until RAX contains no char 10 x n -> RAX = next char of flag Pass: ThisIsATriumph Flag: 35C3_ + Pass

  7. 29. pro 2018.

    I published the sources and exploits for my challenges for : collection and funfox (done with ) :

    Prikaži ovu nit
  8. 12. velj 2019.

    If you enjoyed that recent runc bug you should try out my namespace challenge from the :

  9. 1. sij 2019.

    Source code and exploit of my DANCEd challenge I've created for this year's junior are now online! Thanks for hosting two awesome CTFs!

  10. 30. pro 2018.

    My write-up for sequence (451 points) Sometimes all it takes to exploit an 0day is nothing more than wild hand-waving and guesswork :)

  11. 4. sij 2019.

    Writeup for the pillow challenge of can now be found here:

    Prikaži ovu nit
  12. 28. pro 2018.

    Ok, this is awesome, a bug I found and disclosed is featured in the 0day challenge with players looking to bypass the fix. Looks like 2 teams have found new bugs... this is why sharing your findings is so cool :)

  13. 2. sij 2019.

    Writeup on exploiting a typing bug (found by ) that forgot to distinguish -0 and +0. Was a super fun and difficult challenge, that I solved right before the CTF ended, just when I was about to give up. Learnt tons along the way

    Prikaži ovu nit
  14. 9. sij 2019.
  15. 17. pro 2018.
  16. 30. pro 2018.

    I published the source code and (commented) example exploits for my macOS browser exploitation challenges: congrats to and for solving all parts (and winning the CTF)! :)

  17. 12. lip 2019.

    On I made a little challenge dubbed 0pack, now the code is open source, redesigned as general purpose tool: HTML slides can be found here:

  18. 11. sij 2019.

    If you liked my logrotate challenge, check out this bug in tmpreaper: . The vulnerable pattern was: rename("/tmp/foo", "/tmp/foo/X") Though I didn't write a full exploit I believe this should give you a root shell.

  19. 27. tra 2019.

    My talk about the mobile phone challenge I gave on Thursday is online on :

  20. 31. pro 2018.

    Here are the sources, exploit and a short description of the solution for the 'post' challenge from

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.