Twitter | Search | |
Dragon Sector
A CTF team
131
Tweets
15
Following
7,989
Followers
Tweets
Dragon Sector Jan 2
2019 was a great year for Dragon Sector! 🏆1st place at global ranking for the 2nd year in a row & 3rd time in the history of our team 🥇1st place at 2 CTFs 🥈2nd place at 5 CTFs 🥉3rd place at 5 CTFs 💻And also organized a well received Dragon CTF 2019!
Reply Retweet Like
Dragon Sector Nov 18
We've released our solution slides for the Dragon CTF 2019: See also:
Reply Retweet Like
Dragon Sector Nov 16
Congratz to DragonCTF 2019 winners! TOP1: p4 () TOP2: PPP () TOP3: ALLES! () GG, WP!
Reply Retweet Like
Dragon Sector retweeted
A girl has no name 🏳️‍⚧️ Nov 15
So uh, I made another CTF challenge with a strange custom architecture (involving non-binary bits):
Reply Retweet Like
Dragon Sector Oct 7
If you're planning to attend Dragon CTF 2019, you might want to take a look at this post:
Reply Retweet Like
Dragon Sector retweeted
Gynvael Coldwind Oct 2
I'm going live in 1.5h to showcase solutions of BabyPDF, PlayCAP and ummmfpu from 𝕿𝖊𝖆𝖘𝖊𝖗 𝕯𝖗𝖆𝖌𝖔𝖓 𝕮𝕿𝕱 2019 by . Join me at:
Reply Retweet Like
Dragon Sector retweeted
Robert Xiao Sep 24
Just published my writeup for CPU Adventure at DSCTF, wherein me, , and reverse engineered a program written for a completely unknown, custom CPU with no access to the CPU, emulator or any documentation:
Reply Retweet Like
Dragon Sector retweeted
👼 Ąż 杏 Sep 23
The "Looking glass" task of the Teaser is an MD5 collision of Protobuf via UniColl made by mlen. Write-up by
Reply Retweet Like
Dragon Sector retweeted
Jai Verma Sep 23
My solution for PlayCAP from teaser.
Reply Retweet Like
Dragon Sector retweeted
Zach Wade Sep 23
Mostly complete disassembler for the CPU Adventure problem. Kudos to for doing most of the reversing and for solving it
Reply Retweet Like
Dragon Sector retweeted
implr Sep 23
I've released the sources to my Teaser task `rms` (and `rms-fixed`):
Reply Retweet Like
Dragon Sector retweeted
j00ru//vx Sep 23
I uploaded my BadType challenge from last weekend's Dragon CTF Teaser on GitHub. It's a medium-difficulty RE task for Windows x64 (worth 400 pts), solved by 9⃣ teams during the competition.
Reply Retweet Like
Dragon Sector retweeted
Luat Nguyen Sep 22
My exploit on `rms-fixed` challenge caused by sort of race conditional while resolving addr of the host.
Reply Retweet Like
Dragon Sector retweeted
Jason Koh 🇸🇬 Sep 22
Write up on recent CTF Challenge: Baby PDF Read more:
Reply Retweet Like
Dragon Sector retweeted
Andrea Biondo @ 36C3 Sep 22
So long since my last blog post... Here's my writeup for Dragon CTF Teaser 2019 "rms" (and "rms-fixed"), enjoy!
Reply Retweet Like
Dragon Sector retweeted
Gynvael Coldwind Sep 22
I've pushed my tasks (with sources / solvers) from Teaser Dragon CTF 2019 to my github: BabyPDF PlayCAP ummmfpu
Reply Retweet Like
Dragon Sector retweeted
A girl has no name 🏳️‍⚧️ Sep 22
Here's a little something that I made for (now-finished) Dragon CTF 2019 Teaser by : (blackbox CPU reverse engineering) — have fun!
Reply Retweet Like
Dragon Sector retweeted
Michał Korman Sep 22
My writeup for PlayCAP challenge from teaser 2019 -
Reply Retweet Like
Dragon Sector retweeted
Adam Iwaniuk Sep 22
Docker apparmor bypass: FROM ubuntu:18.04 # get rid of procfs VOLUME /proc # fake files to avoid fail on run COPY empty /proc/self/attr/exec COPY empty /proc/self/fd/4 COPY empty /proc/self/fd/5 COPY empty /proc/self/status # cmd will not have apparmor restrictions CMD YOUR_CMD
Reply Retweet Like
Dragon Sector Sep 22
The Teaser Dragon CTF 2019 is now over! TOP1: PPP TOP2: p4 TOP3: Balsn Full scoreboard: Congratz all around! If you've played our CTF, please fill out our post-CTF survey: (and don't forget to vote on CTF time) GG WP!
Reply Retweet Like