#34c3ctf search results

It was not "medium", it was hard. We are happy anyway! #34c3 #34c3ctf

LosFuzzys's tweet image. It was not "medium", it was hard. We are happy anyway! #34c3 #34c3ctf

☑️Arrived at #34c3 ☑️Deployed Flag ☑️Printed a „few“ Stickers 9h until #34c3ctf - hope you are ready, we are!

EatSleepPwnRpt's tweet image. ☑️Arrived at #34c3
☑️Deployed Flag
☑️Printed a „few“ Stickers

9h until #34c3ctf - hope you are ready, we are!

lol, in extract0r chal #34c3ctf @orange_8361

0xBADCA7's tweet image. lol, in extract0r chal #34c3ctf @orange_8361

#34c3ctf is over! Flag submission is closed - Good game everyone! Top 3 #34c3ctf: 1. @pastenctf 2. Tea Deliverers 3. @DragonSectorCTF Top 3 #junior34c3ctf: 1. Rudolfos Toddlers 2. @hackthissite 3. Made In MIM

EatSleepPwnRpt's tweet image. #34c3ctf is over! Flag submission is closed - Good game everyone!

Top 3 #34c3ctf:
1. @pastenctf
2. Tea Deliverers
3. @DragonSectorCTF

Top 3 #junior34c3ctf:
1. Rudolfos Toddlers
2. @hackthissite
3. Made In MIM

Here is a video of my #34C3CTF Blinkenlights challenge in case you wondered if I have actual hardware. Yes, I have. As always, it looks way better in real life because of the limited dynamic range of the camera sensor.


A strong VM host could be useful for #34c3ctf. Win10 RS3 VMs can be had at developer.microsoft.com/en-us/windows/…. Apply latest updates. We recommend VMware and 16G of RAM. Happy holidays!

EatSleepPwnRpt's tweet image. A strong VM host could be useful for #34c3ctf. Win10 RS3 VMs can be had at developer.microsoft.com/en-us/windows/…. Apply latest updates.

We recommend VMware and 16G of RAM. Happy holidays!

Think now is a good time to write a Chrome exploit? Do `nc 35.198.159.246 1337` or visit 34c3ctf.ccc.ac/challenges/ and look for the "v9" challenge =) #34C3CTF #34C3


Challenge files, docker environment, and my exploit for the "v9" Chromium pwnable of #34c3ctf. Congrats to @itszn13 and A*0*E for solving it in time! github.com/saelo/v9 #34C3


PSA: We are hyped for #34c3ctf. There will be rather unique challenges this year. You should be too! See you at #34c3 or in IRC!


software_update challenge from the #34c3ctf was an awesome practical example of math applied to security. We learn about basic linear algebra and finite-fields to break an XOR signature implementation. youtube.com/watch?v=EOlddN…

LiveOverflow's tweet card. Linear independence and GF(2) - 34C3 CTF software_update (crypto)...

youtube.com

YouTube

Linear independence and GF(2) - 34C3 CTF software_update (crypto)...


I made a pair of kernel exploitation challenges on Windows 10 RS3 for #34c3ctf. 34c3ctf.ccc.ac/uploads/elgoog… is the "easy" version, 34c3ctf.ccc.ac/uploads/elgoog… is the real deal.


Part 1/2 of another #34c3ctf challenge. The solution of this one really blew me away. But in the first episode we just review the code and think of possible attacks. youtube.com/watch?v=Vgdhlh…

LiveOverflow's tweet card. Python code audit of a firmware update - 34C3 CTF software_update...

youtube.com

YouTube

Python code audit of a firmware update - 34C3 CTF software_update...


#34c3ctf received the perfect @CTFtime rating of 100 this year. Thank you for the great feedback! We had VBox 0day, Win+Linux kernel pwns, browser exploits, super hard web challenges, and the hardest Windows pwnable we have ever exploited. Let's see if we can keep up next year.


phoenhex.re/2018-03-25/not… is about a cool feature of Vagrant that allows unprivileged guest processes to read/write the entire host filesystem. If you do not like this feature in your Vagrant setup, export VAGRANT_DISABLE_VBOXSYMLINKCREATE=1 Also, babyvm2 writeup for #34c3ctf


software_update challenge from the #34c3ctf was an awesome practical example of math applied to security. We learn about basic linear algebra and finite-fields to break an XOR signature implementation. youtube.com/watch?v=EOlddN…

LiveOverflow's tweet card. Linear independence and GF(2) - 34C3 CTF software_update (crypto)...

youtube.com

YouTube

Linear independence and GF(2) - 34C3 CTF software_update (crypto)...


RT hasherezade "RT LiveOverflow: Part 1/2 of another #34c3ctf challenge. The solution of this one really blew me away. But in the first episode we just review the code and think of possible attacks. youtube.com/watch?v=Vgdhlh…"


Part 1/2 of another #34c3ctf challenge. The solution of this one really blew me away. But in the first episode we just review the code and think of possible attacks. youtube.com/watch?v=Vgdhlh…

LiveOverflow's tweet card. Python code audit of a firmware update - 34C3 CTF software_update...

youtube.com

YouTube

Python code audit of a firmware update - 34C3 CTF software_update...


RT hasherezade "RT LiveOverflow: Two years ago I failed to solve the pwnable readme challenge at the #32c3ctf. Since then I have learned a lot and I got another chance at the #34c3ctf! youtube.com/watch?v=lE6ke7…"


This is the best writeups on advanced heap exploitation I've read in a while. I think technique 1 is what @maciekkotowicz used in #34c3ctf.

From heap to RIP: getting code execution from pure glibc heap mechanics blog.frizn.fr/glibc/glibc-he…



This is essentially the babyvm2 challenge from #34c3ctf. Will do a writeup maybe after my next exam :)


CVE-2018-2693 was my intended solution for babvm2 at #34c3ctf, which DragonSector also found. It allows (amongst others) access to shared folders from unprivileged processes, so we can create symlinks and open them host-side. May do a writeup if valis won't.


We are proud to share our first ever blog post with you. Many thanks to @koyaan5 for explaining us how to solve the m0rph challenge from #34C3CTF sigflag.at/blog/2017/writ…


My beginner focused writeup of solving the morph challenge from #34C3CTF with @radareorg I did for @SIGFLAG_CTF was just published! sigflag.at/blog/2017/writ…


Thank you for writing this challenge and for putting together #34c3ctf. I learned a lot!


Pretty neat write-up for a simple pwnable challenge I did for #34c3ctf, if you are interested in learning more about some of the latest glibc allocator developments: blog.rh0gue.com/2018-01-05-34c…


Wargames and CTFs that are doable for beginners like PicoCTF, SHA CTF Junior and #34c3ctf Junior.


I made a quick writeup for my extract0r web challenge from the #34c3ctf github.com/eboda/34c3ctf/…


My writeup on #34c3ctf 300 challenge: github.com/chksum0/writeu… tldr: House of Orange + vtable validation bypass


Maybe should make a #findmyunicorn and see how many replies it gets? #34C3 #34c3ctf


Here's my exploit for my heap challenge (300) of the #34c3ctf. I solved it by overwriting (older) libc's check_action variable using a corrupted unsorted bin. This disables abort on error and gives a write-what-where primitive. gist.github.com/sroettger/591b…


No results for "#34c3ctf"

lol, in extract0r chal #34c3ctf @orange_8361

0xBADCA7's tweet image. lol, in extract0r chal #34c3ctf @orange_8361

☑️Arrived at #34c3 ☑️Deployed Flag ☑️Printed a „few“ Stickers 9h until #34c3ctf - hope you are ready, we are!

EatSleepPwnRpt's tweet image. ☑️Arrived at #34c3
☑️Deployed Flag
☑️Printed a „few“ Stickers

9h until #34c3ctf - hope you are ready, we are!

#34c3ctf is over! Flag submission is closed - Good game everyone! Top 3 #34c3ctf: 1. @pastenctf 2. Tea Deliverers 3. @DragonSectorCTF Top 3 #junior34c3ctf: 1. Rudolfos Toddlers 2. @hackthissite 3. Made In MIM

EatSleepPwnRpt's tweet image. #34c3ctf is over! Flag submission is closed - Good game everyone!

Top 3 #34c3ctf:
1. @pastenctf
2. Tea Deliverers
3. @DragonSectorCTF

Top 3 #junior34c3ctf:
1. Rudolfos Toddlers
2. @hackthissite
3. Made In MIM

It was not "medium", it was hard. We are happy anyway! #34c3 #34c3ctf

LosFuzzys's tweet image. It was not "medium", it was hard. We are happy anyway! #34c3 #34c3ctf

A strong VM host could be useful for #34c3ctf. Win10 RS3 VMs can be had at developer.microsoft.com/en-us/windows/…. Apply latest updates. We recommend VMware and 16G of RAM. Happy holidays!

EatSleepPwnRpt's tweet image. A strong VM host could be useful for #34c3ctf. Win10 RS3 VMs can be had at developer.microsoft.com/en-us/windows/…. Apply latest updates.

We recommend VMware and 16G of RAM. Happy holidays!

Loading...

Something went wrong.


Something went wrong.


United States Trends