2019

@r3tr0sp3ct2019

pwner at and ; security researcher working on V8; opinions are my own

/root/flag
Vrijeme pridruživanja: travanj 2019.

Tweetovi

Blokirali ste korisnika/cu @r3tr0sp3ct2019

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @r3tr0sp3ct2019

  1. proslijedio/la je Tweet
    23. stu 2019.
    Poništi
  2. proslijedio/la je Tweet
    17. lis 2019.

    We published a writeup for HITCON 2019 Quals.

    Poništi
  3. proslijedio/la je Tweet
    14. lis 2019.

    Uploaded all my challenges for HITCON CTF Quals 2019! Include the src/sol of funny misc chals, a RE challenge written in Crystal, and the hardest challenges, PoE, that needs you to exploit the user-space program, the Linux kernel module, and hack QEMU!

    Prikaži ovu nit
    Poništi
  4. 14. lis 2019.

    want a writeup for poe2 in :(

    Poništi
  5. proslijedio/la je Tweet
    23. ruj 2019.

    Slides from my talk "Behind Enemy Lines- Reverse Engineering C++ in Modern Ages".

    Poništi
  6. 23. ruj 2019.

    almost got it at the end of the CTF :(

    Poništi
  7. proslijedio/la je Tweet

    v8 Map migration doesn't respect element kind, leading to type confusion

    Poništi
  8. proslijedio/la je Tweet
    15. ruj 2019.

    The challenges are really hard and interesting. I solved Across the Great Wall with Blind Heapfengshui. Actually i don't know what happens but the initial state of remote heap is not identical with my local server.

    Poništi
  9. 15. ruj 2019.

    My writeup for accessible in : Thank you very much, learned a lot from this challenge.

    Poništi
  10. proslijedio/la je Tweet
    9. srp 2019.
    Poništi
  11. proslijedio/la je Tweet
    3. lip 2019.

    We teamed up with again to place 15th at Facebook CTF.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·