Tweetovi

Blokirali ste korisnika/cu @hxpctf

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @hxpctf

  1. Prikvačeni tweet
    29. pro 2019.

    Congratulations to for coming in first, r00timentary second, and third!

    Poništi
  2. 14. sij

    Full release of our research paper on executing a "preimage attack" on the MD5 function.

    Poništi
  3. proslijedio/la je Tweet
    12. sij

    Checkout 's great writeup on md15 from CTF ( - you rock!) - . Interesting point: if we run this on WSLv1, it's immediately fail (due to different behavior in the loader) on the whole point of the chg, revealing everything ;)

    Poništi
  4. proslijedio/la je Tweet
    11. sij

    I published a write-up for md15 from 36C3 CTF:

    Prikaži ovu nit
    Poništi
  5. 8. sij

    Just in case anyone still cares about last year's CTFs, we just published a few more rare writeups at ! Feel free to ping us if you're still missing something or have any other questions.

    Poništi
  6. proslijedio/la je Tweet
    8. sij
    Poništi
  7. proslijedio/la je Tweet
    5. sij

    Just got a second exploit and write-up from the CTF! This time from "braindead" 🧠💀 This one combines missing userspace pointer validation in writev() with a TOCTOU in clock_nanosleep(). Great show! 😊👍

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    4. sij

    I did a "casual" writeup of the "Token of HXP" challenge I played with at : /cc

    Poništi
  9. proslijedio/la je Tweet
    3. sij

    In the wake of last week's exploit, I've been auditing the SerenityOS syscalls and found quite a number of terrible and very exploitable bugs. 🐞💣💥 Let me show you some of them!

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    3. sij

    Our writeup for compilerbot challenge is up: Always fun solving challenges with

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    2. sij

    When you include a file inside of a macro invocation, it seems GCC goes into the included file and fails to finish the macro call there. Clang does not have this problem. Found it during analysis of writeup to 36c3 CTF compilerbot challenge

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    1. sij
    Poništi
  13. 1. sij

    Reminder to report your security findings to this awesome project :)

    Poništi
  14. proslijedio/la je Tweet
    30. pro 2019.

    - Deep dive into a bug in the SSE version of libc's strncpy. Awesome challenge by at !

    Poništi
  15. 30. pro 2019.

    Bye bye hxp CTF auto pwner (our monitoring)

    Poništi
  16. proslijedio/la je Tweet
    29. pro 2019.

    As usual, great challenges at CTF! Always fun to find 0days at CTF :P Thanks so much and ! :)

    Poništi
  17. 30. pro 2019.

    The real token of hxp

    Poništi
  18. 30. pro 2019.

    Peek into the load balancer and reset circuit of the Totally not BadUSB challenge

    Poništi
  19. proslijedio/la je Tweet
    29. pro 2019.

    It's not only Drunken Sector...

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    29. pro 2019.

    GG and congratz to (12240 pts - impressive score!🤯) & r00timentary (6182 pts, beat us by 45 pts in last 20 minutes😢)! The tasks were great! And I'm really happy about my first blood on "token of hxp", and accidental solve on "Totally not BadUSB" (both AVR+USB)😊

    Poništi
  21. proslijedio/la je Tweet
    29. pro 2019.

    I have a lot of respect for whatever sadist on designed a challenge with a 473 byte handwritten binary that creates an LCG from user input that will need to generate ASCII readable shellcode. Truly evil.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·