udp_ctf's profile picture. pwn @ Water Paddler / Blue Water

udp

@udp_ctf

pwn @ Water Paddler / Blue Water

你可能会喜欢
置顶

So the challenge i wrote for @PotluckCTF introduced a new heap house (which I shamelessly dubbed "house of water" after my two teams), and a general technique I dubbed "safe link double protect". Both are now available here: github.com/shellphish/how… github.com/shellphish/how…

Made a fun little heap challenge for #37C3 @PotluckCTF called Tamagoyaki. It features a fun way to bypass protect_ptr without a leak I discovered while exploiting a bug. It only got one solve during the CTF, so made a writeup: github.com/UDPctf/CTF-cha…



udp 已转帖

We (Project Zero) got a new website! Because the last one was so...2014? projectzero.google


Here is a fun little 0-click RCE for WarCraft II I wrote for BlueWater CTF (which unfortunately won't see the light of day) It works on the GoG release, and hits everyone on the network searching for a game. So be careful at your next boomer lan party😱 github.com/UDPctf/CTF-cha…


udp 已转帖

An analysis of a recent 0-click exploit targeting Samsung devices: googleprojectzero.blogspot.com/2025/12/a-look…


udp 已转帖

Analysis of CVE-2025-6554: A type confusion vulnerability in V8! Constructed addrof/fakeobj, read/write primitives in V8 sandbox. Thanks to @DarkNavyOrg, @mistymntncop, @bjrjk for helping me with the exploitation. github.com/aklnjakln/CVE-…


udp 已转帖

We really should be talking about this more....KASLR is just not working properly on Android right now, and it hasn't for a long time. googleprojectzero.blogspot.com/2025/11/defeat…


udp 已转帖

I'm pretty excited about this (POE2 in particular)! It's basically what we've been preparing for with the PKEY-based hardware sandboxing prototype for V8 (docs.google.com/document/d/1l3…)

More HW security goodness from Arm: community.arm.com/arm-community-… vMTE (Virtual Memory Tagging) allows to use MTE in a more flexible way, consuming less RAM. POE2 allows to build efficient in-process sandboxes and isolation. More-or-less improvement over x86 Memory Protection Keys.



Guess you could say they were Unsat :^)


udp 已转帖

Planning a CTF? We're here to support organizers with proven expertise and a commitment to quality challenges. Apply here: dfsec.com/ctf-support


It's so over

First mention of x86 memory tagging (aka MTE) by both Intel and AMD (codename ChkTag): community.intel.com/t5/Blogs/Tech-… amd.com/en/blogs/2025/… 🤘🤘🤘



At @hexacon_fr, come say hi!


udp 已转帖

Check out our newest blog about how we took advantage of a WebGPU feature to turn an integer underflow bug into an arbitrary read in Chrome’s WebGPU. This bug was fixed by Google long ago, but our ticket is still restricted. qriousec.github.io/post/oob-angle/ by @lanleft_ + @__suto


udp 已转帖

so excited to finally share something I’ve been working on alongside many brilliant colleagues. MTE will truly raise the bar for memory safety. security.apple.com/blog/memory-in…

rajxnull's tweet image. so excited to finally share something I’ve been working on alongside many brilliant colleagues. MTE will truly raise the bar for memory safety.

security.apple.com/blog/memory-in…

udp 已转帖

🥈 Thrilled to nab 2nd as Blue Water, teamed up with @perfect_blue at DEFCON CTF Final 33! 🙌 Congrats to @mmm_ctf_team for their 4th straight 1st 💪 We’re gunning for the crown next year! Join our crew to make it happen! DM us or drop us an email! 🚀 #DEFCON #CTF


Getting 2nd place in Defcon finals for the third year in a row has triggered the great depression for the team xd


udp 已转帖

Mini Writeup of CVE-2025-6554. POC by @DarkNavyOrg. All errors in writeup my own. gist.github.com/mistymntncop/3…


Finding exploitable browser bugs during exam season sucks. Makes it very difficult to focus on studying when constantly thinking of the bug 🫠


udp 已转帖

Our new blog post is live: blog.dfsec.com/ios/2025/05/30…


udp 已转帖

🚨🚨🚨We just broke everyone’s favorite CTF PoW🚨🚨🚨 Our teammate managed to achieve a 20x SPEEDUP on kctf pow through AVX512 on Zen 5. Full details here: anemato.de/blog/kctf-vdf The Sloth VDF is dead😵 This is why kernelCTF no longer has PoW!

anemato.de

Beating the kCTF PoW with AVX512IFMA for $51k

PoW is gone 🦀🦀


United States 趋势

你可能会喜欢

Loading...

Something went wrong.


Something went wrong.