-
Thanks to osmocombb and the whole osmocom GSM network stack components I was able to build my own GSM phone for a
#35c3ctf challenge. Any similarity with previous commercial phones is a pure coincidence. If you want to hack this thing, check out newphonewhodis and identitytheft. pic.twitter.com/M14zBg6FeB -
I just wrote another blog post. This time its a write up for a
#35c3CTF its the php challenge. https://rayoflightz.github.io/writeup/web/2019/01/03/35c3-php-writeup.html …@EatSleepPwnRpt -
I published my
#35c3ctf challenge sources and exploits: https://github.com/niklasb/35c3ctf-challs/ … includes very high-level writeups for sequence and keybasePrikaži ovu nit -
I just released a Writeup for the WebKid challenge of
#35C3CTF. You can find it here: https://github.com/LinusHenze/35C3_Writeups/blob/master/WebKid/README.md … Writeup for pillow will follow soon...Prikaži ovu nit -
I recently published a writeup for the namespaces challenge from
#35C3CTF: Escaping a Broken Container https://blog.perfect.blue/namespaces-35c3ctf … -
WriteUp of 0pack
#35C3CTF: Requirements: gdb-peda gdb ./0pack.elf break fgets start 5 x n JustATextForInputField ret 7 x n -> RAX = 1. char of flag Repeat the following step, until RAX contains no char 10 x n -> RAX = next char of flag Pass: ThisIsATriumph Flag: 35C3_ + Pass -
I published the sources and exploits for my challenges for
#35C3CTF: collection and funfox (done with@_niklasb) :https://github.com/bkth/35c3ctfPrikaži ovu nit -
If you enjoyed that recent runc bug you should try out my namespace challenge from the
#35c3ctf: https://35c3ctf.ccc.ac/uploads/namespaces-a4b1ac039830f7c430660bc155dd2099.tar … -
Source code and exploit of my DANCEd challenge I've created for this year's junior
#35c3ctf are now online! Thanks@EatSleepPwnRpt for hosting two awesome CTFs!#35c3https://github.com/pr0me/35c3ctf-DANCEd … -
My write-up for sequence (451 points) Sometimes all it takes to exploit an 0day is nothing more than wild hand-waving and guesswork :)
#35c3ctf@5BCCTFhttps://github.com/yannayl/ctf-writeups/blob/master/2018/ccc/sequence/README.md … -
Writeup for the pillow challenge of
#35C3CTF can now be found here: https://github.com/LinusHenze/35C3_Writeups/blob/master/pillow/README.md …Prikaži ovu nit -
Ok, this is awesome, a bug I found and disclosed is featured in the
#35c3ctf 0day challenge with players looking to bypass the fix. Looks like 2 teams have found new bugs... this is why sharing your findings is so cool :) https://35c3ctf.ccc.ac/challenges/ -
Writeup on exploiting a typing bug (found by
@_tsuro) that forgot to distinguish -0 and +0. Was a super fun and difficult challenge, that I solved right before the CTF ended, just when I was about to give up. Learnt tons along the way#35C3CTF#krautflarehttps://www.jaybosamiya.com/blog/2019/01/02/krautflare/ …Prikaži ovu nit -
https://ddaa.tw/35c3ctf_2018_zajebiste_290_logrotate.html …
#35c3ctf logrotate write up (Chinese only, sorry) -
Finally finished our
#35c3ctf logo!@EatSleepPwnRpt#35c3pic.twitter.com/q8gKwJLDgv
-
I published the source code and (commented) example exploits for my
#35C3CTF macOS browser exploitation challenges: https://github.com/saelo/35c3ctf congrats to@qwertyoruiopz and@i41nbeer for solving all parts (and winning the CTF)! :)#35c3https://twitter.com/5aelo/status/1078386061615734784 … -
On
#35C3CTF I made a little challenge dubbed 0pack, now the code is open source, redesigned as general purpose tool: https://github.com/Luis-Hebendanz/0pack … HTML slides can be found here: https://luis-hebendanz.github.io/0pack/ -
If you liked my logrotate
#35c3ctf challenge, check out this bug in tmpreaper: https://www.debian.org/security/2019/dsa-4365 …. The vulnerable pattern was: rename("/tmp/foo", "/tmp/foo/X") Though I didn't write a full exploit I believe this should give you a root shell. -
My talk about the
#35C3CTF mobile phone challenge I gave on Thursday is online on http://media.ccc.de :https://media.ccc.de/v/c4.openchaos.2019.04.the-35c3-ctf-nokia-phone-challenge … -
Here are the sources, exploit and a short description of the solution for the 'post' challenge from
#35c3ctf https://github.com/eboda/35c3
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.