Mattias Karlsson

@likvidera

Reverse and exploit stuff ™ Play CTF with

Sweden
Vrijeme pridruživanja: svibanj 2013.

Tweetovi

Blokirali ste korisnika/cu @likvidera

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @likvidera

  1. Prikvačeni tweet
    23. ruj 2019.

    Write-up for mirc2077, a challenge I made for the SEC-T CTF 2019. It's a minimal 'browser-pwnable' using Duktape as the JS-engine and Seccomp for sandboxing.

    Poništi
  2. proslijedio/la je Tweet
    1. velj

    Here is my massive lib db (for ctfs/wargames/blind pwns etc.). It consists of thousands of libs across over a dozen Linux distributions and architectures spanning the last 20 years. It indexes symbols & gadgets (including one gadgets AKA magic gadgets).

    Poništi
  3. proslijedio/la je Tweet
    28. sij

    Qualys Security Advisory: LPE and RCE (CVE-2020-7247) in OpenSMTPD, OpenBSD's mail server. Erroneous logic in smtp_mailaddr() which validates user and domain. More details and PoC at: PS: "Did you ever play tic-tac-toe?"

    Poništi
  4. proslijedio/la je Tweet
    14. sij

    INFILTRATE Training Update! Happy to announce from will be joining as a co-trainer. Come learn how to use program analysis for vulnerability research.

    Poništi
  5. proslijedio/la je Tweet
    10. sij

    I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64.

    Poništi
  6. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    8. pro 2019.

    Santa has a new sticker for his laptop... say hi to our newest silver sponsor, -

    Poništi
  8. proslijedio/la je Tweet

    Interview with one of the world's best competitive bug hunters

    Poništi
  9. proslijedio/la je Tweet
    6. pro 2019.

    We are all excited to announce watevrCTF Which is starting of on friday 19:00 UTC, meaning exactly one week left!

    Poništi
  10. proslijedio/la je Tweet
    1. pro 2019.

    Here we go, the second OverTheWire Advent Bonanza CTF has begin!! Enjoy! Also, don't forget that we have a Santaty Flag on Discord and IRC to test the flag submission. Sign up here if you haven't already:

    Poništi
  11. proslijedio/la je Tweet
    25. stu 2019.

    It's starting to get nice and cosy on the Discord chat. Are you one of the 421 teams that have signed up already?

    Poništi
  12. proslijedio/la je Tweet

    That brings Tokyo 2019 to a close. Congrats to on successfully defending their Master of Pwn title. In two days, they racked up $195,000 for their research. Congrats!

    Poništi
  13. proslijedio/la je Tweet
    2. stu 2019.

    The registration for the Advent Bonanza CTF 2019 is now open! Come inside, it's warm and cozy next to our challenge-zero bonfire as well ... :D

    Poništi
  14. proslijedio/la je Tweet
    15. lis 2019.
    Poništi
  15. proslijedio/la je Tweet
    31. kol 2019.

    SEC-T CTF is back on September the 18th! In Addition to our original crew, we are partnering up with , from and from to bring you the finest pwnage!

    Poništi
  16. proslijedio/la je Tweet
    30. kol 2019.

    Short follow-up blog post about the research on reference counter overflows. This time: Exploiting mqueuefs and how an was identified during this. Full exploit included ;-)

    Poništi
  17. proslijedio/la je Tweet
    23. kol 2019.

    I just published a small IDA helper script to facilitate finding the lowest common ancestor functions for two defined function calls. Can be helpful to identify interesting functions for deep hooking while fuzzing.

    Poništi
  18. proslijedio/la je Tweet

    and I did some entertaining work on magic hashes this weekend:

    Poništi
  19. 29. srp 2019.

    I did not finish my exploit during the pwnyrace but here is my post-exploit/analysis

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·