RET2 Systems

@ret2systems

We strive to reimagine vulnerability research, program analysis, and security education as it exists today.

Troy, NY
Vrijeme pridruživanja: lipanj 2017.

Medijski sadržaj

  1. 1. velj

    There are 20 bottles left at our 2020 booth heist! Finish up your exploit soon, because we are on track to run out of bottles by the end of the day.

  2. 13. sij

    We're sponsoring again this year, and we'll be giving away RET2 laser etched bottles to the first 50 hackers who solve our binary exploitation challenge at the conference!

  3. 28. kol 2019.

    We abused a well-defined web standard to exploit a popular cryptocurrency daemon through your browser. Who is up for a little digital heist? ¯\_(ツ)_/¯

  4. 15. kol 2019.

    Our November training on ubiquitous browser exploitation has 14/20 seats filled. Early bird pricing will be ending tomorrow, August 16th. Join us for a week, and we'll teach you how to make every click risky:

  5. 26. lip 2019.

    During Quals we discovered CPU-level errata... and then we exploited it:

  6. 18. tra 2019.

    Feeling adventurous? Another exploit challenge has escaped from our servers. To support ecosystem diversity, the first woman/female-identifying solver will win a FREE seat to our browser exploitation training in June! Click here to play:

  7. 12. ožu 2019.

    Over half the seats to our browser exploitation training have been filled 😱 Both attackers and defenders stand to learn something new. Early bird pricing ends this Friday, register @

    Reviewing vulnerabilities in JavaScriptCore code
  8. 21. velj 2019.

    Want to learn an unreasonable amount about exploiting JavaScript engines? Take our 5-Day Security Training on Advanced Browser Exploitation! June 3 - 7, 2019. Troy, New York Register @

  9. 19. sij 2019.

    Almost 100 people have solved our crackme 😱! We're going to be out of mugs by the end of today. But feel free to come by the booth and grab some stickers

    Prikaži ovu nit
  10. 18. sij 2019.

    We're hosting a small heist at ! Solve our reverse engineering challenge, steal one of our mugs. The link can be found on the back of our stickers in your bag!

    Prikaži ovu nit
  11. 27. pro 2018.

    Tomorrow at , we will give a behind-the-scenes look at the process of Engineering. Watch as we break common misconceptions regarding this increasingly difficult tradecraft:

  12. 10. lis 2018.

    Daydreaming on the ideals of an interoperable ecosystem for security tooling, the latest release of Lighthouse now supports both Binary Ninja & IDA Pro on all available platforms:

  13. 15. ruj 2018.

    We've been overwhelmed by the interest into our wargames platform blogpost. For those left wanting more, we contributed a harder challenge to CTF that is running this weekend:

  14. 11. ruj 2018.

    Security education is something we are deeply passionate about, and we're trying to help make it better. Read about the accessible, gamified approach we've been using to teach and scale binary exploitation education:

  15. 28. kol 2018.

    Closing out the 2018 blog series with with the details behind our sandbox-to-root privilege escalation (CVE-2018-4193). Write a less-shady exploit, and we'll give you a free Commercial License!

  16. 25. srp 2018.

    Total system is only possible if you can escape the browser sandbox. Watch as we crack the walls of the sandbox with a toy fuzzer. Part FIVE of our series:

  17. 11. srp 2018.

    Vulnerability weaponization is the most frequently discussed topic of the development lifecycle. Here's our take on weaponizing a vulnerability from the ground up: part four

  18. 19. lip 2018.

    One of our favorite technologies comes from , so this week we wanted to help highlight an amazing project. Part three of our series makes use of timeless debugging to root cause an exploitable race condition in :

  19. 13. lip 2018.

    The second blogpost of our exploitation series is out, and this week we're sharing some tips on the deconstruction of complex software () to find security vulnerabilities:

  20. 5. lip 2018.

    Last week fixed our bugs! We've rolled out the first blogpost of a series which will document a methodical approach to the discovery and exploitation of these vulnerabilities. The Exploit Development Lifecycle, From A to Z(ero Day):

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·