Xion Profile
Xion

@0x10n

Followers
1,783
Following
103
Media
30
Statuses
319

To-be CMU PhD student / Winner of Pwn2Own Vancouver '24, TyphoonPWN '24, kernelCTF, v8CTF, DEFCON 31 CTF, ... / KAIST GoN '18 & @zer0pts

Daejeon, Republic of Korea
Joined August 2020
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
@0x10n
Xion
4 months
Not bad for a first time I guess :)
@thezdi
Zero Day Initiative
4 months
That's a wrap! #Pwn2Own Vancouver is complete. Overall, we awarded $1,132,500 for 29 unique 0-days. Congrats to @_manfp for winning Master of Pwn with $202,500 and 25 points. Here's the final top 10 list:
Tweet media one
7
38
224
7
3
104
@0x10n
Xion
4 months
yay :) now back to praying for tomorrow's Edge+Chrome double-tap entry 🙏
@thezdi
Zero Day Initiative
4 months
Confirmed! Seunghyun Lee ( @0x10n ) of KAIST Hacking Lab used a UAF to get code execution in the #Google Chrome renderer. He earns $60,000 and 6 Master of Pwn points. #Pwn2Own
Tweet media one
0
15
100
6
3
91
@0x10n
Xion
24 days
PartitionAlloc still leaving us some super-easy-to-exploit raw pointers 🤗 This v8sbx bypass unfortunately still isn't fixed, work is underway to make the metadata read-only (i.e. ShadowMetadata)
@xvonfers
xvonfers
24 days
Tweet media one
Tweet media two
0
3
20
1
11
79
@0x10n
Xion
4 years
I've uploaded a list of resources that I accumulated throughout learning Windows pwnable. The list isn't exactly well sorted, but hopefully it would be useful as a reference for those trying to learn Windows pwnable with Linux backgrounds.
3
24
71
@0x10n
Xion
1 month
I only have a vague guess on what that $20k is (I don't have issue tracker visibility), but anyways GG :)
Tweet media one
2
4
68
@0x10n
Xion
2 years
2nd place on zer0pts CTF 2022 with @SuperGuesser + KAIST GoN. Due to COVID cohort I only had my lowly smartphone for the whole CTF, but one has to cope with such environments :) Solved gitfileexplorer, chirashi-sushi modern-rome, memsafed, accountant, sbx-note, redis-lite (1/2)
Tweet media one
@SuperGuesser
Super Guesser
2 years
We got 2nd place at @zer0pts CTF 2022 and collaborated with KAIST GoN!!
Tweet media one
0
0
36
3
10
64
@0x10n
Xion
20 days
🤔
Tweet media one
0
3
62
@0x10n
Xion
10 months
🧐
Tweet media one
1
4
59
@0x10n
Xion
1 month
compensating with the quickest v8ctf submission in history :)
Tweet media one
@0x10n
Xion
2 months
Oh no just seen a commit fixing a bug that I immediately recognize, why did I not analyze this one step further 🥲
1
0
9
2
6
59
@0x10n
Xion
4 months
Submitted my latest research on browser security to Black Hat USA #BHUSA related to my two Pwn2Own entries! Looking forward to discuss about finding and exploiting the bugs, revealing long overlooked design issues & show even more exploit techniques in the way :) @BlackHatEvents
0
4
58
@0x10n
Xion
1 year
Tweet media one
3
7
54
@0x10n
Xion
2 months
😉
@typhooncon
TyphoonCon🌪️
2 months
💻 It looks like Chrome was PWNed with an RCE. We're now looking into the details and verifying everything
0
7
64
0
5
51
@0x10n
Xion
4 months
Good luck everyone on #Pwn2Own ! Hoping that my unfortunate random draw of third-to-last Edge double-tap won't get duped with the Chrome ones 🙏 Oh and if anyone from @thezdi working with P2O could check my email please do so ASAP, thanks :)
2
1
51
@0x10n
Xion
3 months
Recognized that I reported another v8sbx escape (not the one from p2o) about a week before this... 💸
@GoogleVRP
Google VRP (Google Bug Hunters)
4 months
The V8 Sandbox is now in scope for Chrome VRP for bypass submissions, meeting specific criteria, with rewards up to $5,000! Please see the Chrome VRP rules [] for full submission criteria and eligibility details.
0
10
100
0
1
43
@0x10n
Xion
2 years
I'm thrilled to announce that I've joined @zer0pts ! Looking forward to all the exciting journeys :D
1
0
42
@0x10n
Xion
9 months
Tweet media one
@c0m0r1
c0m0r1
9 months
Neat Room 🔥🔥🔥 #POC2023
Tweet media one
Tweet media two
1
2
24
2
1
39
@0x10n
Xion
2 years
Ranked #1 at WACon 2022 Quals (a local ctf w/ chals made by @SuperGuesser ) with old KAIST GoN members ironore15, @c0m0r1 & @gPayl0ad as "The Goose". Still in my mandatory military service so had to play on an overnight stay outside. Review: CTF was tasty, Dewar's 12yo was fun.
Tweet media one
Tweet media two
0
7
36
@0x10n
Xion
4 months
This revealed to be the best random draw ever 🎉
@0x10n
Xion
4 months
Good luck everyone on #Pwn2Own ! Hoping that my unfortunate random draw of third-to-last Edge double-tap won't get duped with the Chrome ones 🙏 Oh and if anyone from @thezdi working with P2O could check my email please do so ASAP, thanks :)
2
1
51
1
2
36
@0x10n
Xion
4 years
My writeup for TWCTF 2020: Vi deteriorated, Blind Shot, Extended Extended Berkeley Packet Filter (partial), 🐦 #twctf
2
5
32
@0x10n
Xion
4 years
Played HITCON CTF 2020 part-time as G0D (KAIST GoN + Definit +zer0pts). I had too much univ stuff on my hands so couldn't participate much. Solved Revenge of Pwn and worked on Archangel Michael's Storage, got all infoleaks but had no time to ROP 😭
4
2
31
@0x10n
Xion
7 months
I authored 4 challenges - the X-box series (not the console, it's X-mas sandBox so don't sue me) X-box: Rusty X-box: Tasty X-box: Crusty X-box:
@0x10n
Xion
7 months
Authored some challenges for 2023 X-mas CTF: CTF starts at Dec. 23 10:00 and ends at Dec. 25 23:59 (UTC+9). Challenges are crowdsourced from the Dreamhack user community. Relax, have fun and enjoy Christmas and the CTF!
1
8
25
1
5
27
@0x10n
Xion
16 days
Tweet media one
@0x10n
Xion
20 days
🤔
Tweet media one
0
3
62
0
2
30
@0x10n
Xion
4 years
My solution for @hack_lu 2020 CTF LowFunHeap chal. Don't be daunted by Windows heap, try it out! #hacklu
1
3
26
@0x10n
Xion
7 months
Authored some challenges for 2023 X-mas CTF: CTF starts at Dec. 23 10:00 and ends at Dec. 25 23:59 (UTC+9). Challenges are crowdsourced from the Dreamhack user community. Relax, have fun and enjoy Christmas and the CTF!
1
8
25
@0x10n
Xion
2 years
Participated in DEFCON 30 CTF Quals for 0xEA as a member of @zer0pts & GoN. Solved BIOS, smuggler's cove, Crypto Chall (+ @c0m0r1 ). Additionally worked on constricted, ncuts. As much as I would like to talk about, there are things better left unsaid; so GG!
0
5
26
@0x10n
Xion
1 year
Yet another one on ~3.9.16: (CVE-2023-30547) Note that this isn't the only bug patched in 3.9.17.
@0x10n
Xion
1 year
vm2 sandbox escape on versions up to 3.9.15 (and yes, this is different from the async exception vuln)
1
15
61
0
8
23
@0x10n
Xion
2 years
* 2022 Fall GoN Open Qual CTF 개최 * 2022 Fall GoN Qual CTF가 개최됩니다! 기간: 8.22 22:00 ~ 8.29 21:00(KST) URL: 이번 대회는 KAIST 정보보호대학원과 사이버보안연구센터의 후원을 받아 진행되며 다양한 상품이 준비되어 있으니 많은 참여 부탁드립니다.
0
3
24
@0x10n
Xion
2 years
퍼너블만 뚝딱하고 가야지 -> 0솔 문제는 풀어주는게 예의 아닐까? -> 솔버 적은 문제들 몇 개만 더 볼까? -> blockchain만 한번 해볼까? -> 다른 컨텐츠도 없는데 남은 문제들 다 털어내야 깔끔하지 않을까?
Tweet media one
3
0
23
@0x10n
Xion
3 years
Ranked 2nd place in zer0pts CTF 2021 as K-Students (KaisHack GoN x PLUS x CyKor). Solved Stopwatch, GuestFS:AFR, OneShot, nasm kit. All first-blood except for AFR. Short writeup:
3
2
22
@0x10n
Xion
2 years
Played Google CTF as @Water_Paddler by @kaanezder 's suggestion, ranked 5th place. TBH due to my current affiliation I couldn't play much, but still a good experience overall.
@kaanezder
kaanezder
2 years
We got 5th place at Google CTF🎉 ( This time I played with @Water_Paddler )
Tweet media one
1
1
72
0
0
21
@0x10n
Xion
4 years
Ranked #1 for #seccon 2020 ctf as a member of KAIST GoN under the alliance team HangulSarang in commemoration of Hangul Day () Solution for kvdb, first blood out of two solvers. Worked together with @ashuu_lee , great teamwork.
1
2
21
@0x10n
Xion
2 years
A tad late tweet, but here's the Finals result:
Tweet media one
@0x10n
Xion
2 years
Ranked #1 at WACon 2022 Quals (a local ctf w/ chals made by @SuperGuesser ) with old KAIST GoN members ironore15, @c0m0r1 & @gPayl0ad as "The Goose". Still in my mandatory military service so had to play on an overnight stay outside. Review: CTF was tasty, Dewar's 12yo was fun.
Tweet media one
Tweet media two
0
7
36
0
3
21
@0x10n
Xion
4 years
1st place at 2020 Cyber Operations Challenge! Participated as KAIST GoN with ironore15, @sumango3 , heohyun73. I solved Drone FCS, RModule and Killer Model. Great work everyone!!
Tweet media one
0
2
21
@0x10n
Xion
3 years
Ranked #1 at 2021 Whitehat Contest (Military Div) with pwn3r_45, @pr0cf51 and ironore15. Half a year of CTF absence surely does weigh one much, couldn't solve the one and only pwn chal "AVar" which should have taken no more than 3~5hrs... (1/2)
1
1
20
@0x10n
Xion
4 years
Output of 3 large cans of 🍺, I can finally sleep in peace 😪
Tweet media one
0
0
17
@0x10n
Xion
3 months
CVE-2024-3400 seems awfully similar to a bug I found in a domestic networking/IoT device vendor lol... they just never stop using unsanitized attacker-controlled session ids to create filenames haha
0
1
17
@0x10n
Xion
1 year
Yet another GoN Qual chals seen later in public CTFs: Fimbulvetr, which I rate myself as one of the best web chal I have made so far :)
0
1
17
@0x10n
Xion
2 months
9905d8693ba1470475598994b4359cb5
1
0
16
@0x10n
Xion
4 years
???: 곤이 요즘 많이 죽은 편이다
Tweet media one
0
0
15
@0x10n
Xion
9 months
Happened to come across this bug recently as it still exist on LTS versions. Interestingly a new refcount overflow bug seem to be accidentally introduced as a bugfix? However on latest LTS (6.1.x) neither of the bugs can actually be triggered... (1/2)
@BugsChromium
Chromium Disclosed Security Bugs
9 months
Security: ChromeOS: Local privilege escalation due to use-after-free in u32 classifier
0
1
12
1
3
15
@0x10n
Xion
4 years
Ranked 1st @ 2020 Christmas CTF from with @mathboy770 , @stereotype32 , @RBTree_ . Solved address_book (only solver 😎), show me the pcap & the "guessy parts" of XP 😉
Tweet media one
1
2
15
@0x10n
Xion
2 years
Was initially writing a chal exploiting CVE-2022-31144 for 2022 GoN Open Qual CTF, but found out this bug and couldn't resist making a 0-day chal 😅 The two bugs exhibit the same exploit primitives, so technically no change in chal difficulty.. probably 😏
@redisfeed
Redis News Feed
2 years
[RELEASE: Redis 7.0.5 is out! Upgrade urgency is SECURITY due to CVE-2022-35951. Mailing list discussion:
0
8
28
0
3
14
@0x10n
Xion
2 years
Author's writeup for F, G, H, I, J:
@0x10n
Xion
2 years
2022 Fall GoN Open Qual CTF has finally concluded after a week-long run. Congratulations to all the top rankers and GG to all the participants for the great work! I authored F ~ J: Heliodor (Web), Emerald Tablet (Web), Reconquista (Pwn), Redis-made (Pwn), NPU (Pwn). (1/2)
Tweet media one
3
1
12
0
2
14
@0x10n
Xion
2 years
KAIST GoN에서 주최하는 내부 CTF 대회가 Dreamhack 플랫폼에서 최초로 공개되어 진행됩니다. CTF는 3월 15일부터 7일간 진행되며 쉬운 문제부터 화끈한 문제까지 총 20문제 가량 준비되어 있습니다. 소정의 상품도 준비가 되어있으니 많은 참여 부탁드립니다!
0
2
13
@0x10n
Xion
2 years
2022 Spring GoN Open Qual CTF에 참가해주신 여러분 모두 수고 많으셨습니다! 저는 NullNull, Unconventional, Trino 시리즈, Showdown 총 7문제를 출제했습니다. 한달도 안된 따끈따끈한 CVE, 유사 0-day도 있는 출제진의 writeup을 아래에서 확인하실 수 있습니다.
1
3
13
@0x10n
Xion
2 years
2022 Fall GoN Open Qual CTF has finally concluded after a week-long run. Congratulations to all the top rankers and GG to all the participants for the great work! I authored F ~ J: Heliodor (Web), Emerald Tablet (Web), Reconquista (Pwn), Redis-made (Pwn), NPU (Pwn). (1/2)
Tweet media one
3
1
12
@0x10n
Xion
4 years
This is my writeup for the winsanity chal of CODEGATE 2020 CTF Finals. For those interested in trying out the challenge without knowing the solution, keep away from "exploit_writeup" and "prob_src" folder :) #codegatectf #codegate2020
0
5
11
@0x10n
Xion
4 years
First time ranking 1st place 🤸 Participated as member of KAIST GoN under an alliance team D0G$. I solved 2.99... chals: Vi deteriorated (shoutout to last touches made by @ptrYudai ) and Blind Shot, both a smooth first blood :D #twctf (1/n)
Tweet media one
1
1
12
@0x10n
Xion
4 years
Another quick & smooth first blood at @hack_lu :) Quite an easy introductory LFH (or just Windows heap) chal, will upload my writeup after midnight (based on KST)
Tweet media one
1
2
10
@0x10n
Xion
1 year
PoC & RCA:
@0x10n
Xion
1 year
vm2 sandbox escape on versions up to 3.9.15 (and yes, this is different from the async exception vuln)
1
15
61
0
1
11
@0x10n
Xion
4 years
In case anyone's interested, here are some (pwn/rev oriented) of the challenge binaries + my solutions for 2020 Cyber Operations Challenge Qual & Finals.
0
4
11
@0x10n
Xion
2 years
Thank you for playing 2022 Spring GoN Open Qual CTF! I wrote a total of 7 challenges: NullNull, Unconventional, Trino series and Showdown. You can check out authors' writeup below, which even contain a 20-day old CVE and a pseudo 0-day.
0
3
11
@0x10n
Xion
3 years
Tweet media one
0
1
10
@0x10n
Xion
2 months
Oh no just seen a commit fixing a bug that I immediately recognize, why did I not analyze this one step further 🥲
1
0
9
@0x10n
Xion
27 days
lol
0
1
9
@0x10n
Xion
3 years
2021 대한민국 화이트햇 콘테스트 (전 사이버작전경연대회)의 팀원을 구하고 있습니다. 현재 대한민국 국군 (육/해/공/해병/국직 전부 포함) 소속, CTF 참여 경험이 있으며 수상을 목표로 같이 참여를 원하시는 분이라면 @pr0cf51 또는 @0x10n 에게 DM주시면 됩니다.
@pr0cf51
pr0cf5
3 years
2021년 사이버작전경연대회에 함께 나갈 분의 DM을 기다리고 있습니다. 조건: - 대한민국 국군(육해공, 국직)에서 근무 - CTF참여경험이 있으며 수상을 목표로 하시는분 * 저희는 현재 3명이 모인상태이며, 마지막 한명을 기다리는 중입니다.
1
4
10
1
4
8
@0x10n
Xion
6 months
6b16f3d14abf476e65e3237f2f770b33b17c21dae68c92c51a6913bd9162a5ce
0
1
7
@0x10n
Xion
2 years
For 2022 Spring GoN Open Qual CTF, the first (experimental) public CTF held by KAIST GoN, I authored a challenge that require players to exploit this bug to obtain RCE! Visit @dreamhack_io to check out the chal "Showdown" ⬇️
@_fel1x
Felix Wilhelm
2 years
My report for this bug is now public: . Thanks @github for donating a 40000$ bounty to Médecins Sans Frontières ()
7
118
572
1
0
7
@0x10n
Xion
3 years
Creating random ctf chals and solving them is my hobby these days since I can't participate CTFs in real time 😂
3
0
7
@0x10n
Xion
4 months
I might be jinxing it, but this of course works on Edge too (i.e. "double tap add-on"). The add-on is limited to once per contestant so wait for tomorrow's entry!
@0x10n
Xion
4 months
yay :) now back to praying for tomorrow's Edge+Chrome double-tap entry 🙏
6
3
91
0
0
7
@0x10n
Xion
4 years
Had a brief participation in KipodAfterFree 2020 CTF as KAIST GoN. Solved yet another Windows pwnable chal, APT41. The solving process felt like 80% forensics oriented reversing + 20% pwnable...
0
1
6
@0x10n
Xion
1 year
@d3ve10per 들키뿟네.
2
0
6
@0x10n
Xion
2 years
Halfway through, 5 chals (3 pwn, 1 web, 1 crypto) still waiting for their first blood!
@dreamhack_io
드림핵 Dreamhack
2 years
🚩 2022 Fall 𝙂𝙤𝙉 Open Qual 현재 랭킹 8개 문제를 해결하신 G0RiyA님께서 1위를, as3617님, imssm99님께서 차례로 2, 3위를 지키고 계십니다! ➤ 442명 참여 중 ➤ 풀리지 않은 문제 5개! ➤ 포렌식 문제 추가 예정 8월 29일까지 계속되니 모두 파이팅이에요 👊 🔗
Tweet media one
0
2
3
0
0
6
@0x10n
Xion
2 months
🙏
0
0
6
@0x10n
Xion
4 years
😋
Tweet media one
1
0
6
@0x10n
Xion
4 years
I took part in CODEGATE 2020 CTF Finals event as the challenge author of winsanity. It was my second authored chal (first one being winterpreter chal of Quals). There were 0 solvers, so I'll publish a detailed writeup soon. #codegatectf #codegate2020
Tweet media one
0
3
6
@0x10n
Xion
2 years
Wonder why PwnKit seem so awfully familiar? The root cause is same with that of one-gadgets crashing on Busybox... I bet I've seen this multiple times on CTFs, just to name one that I made: "Format Sniper" on @dreamhack_io featuring the bug as a "fun gimmick" 😏
1
0
5
@0x10n
Xion
1 month
@buptsb I'm assuming that the v8ctf team intentionally left this info blank on the submission sheet for now, so I'll stick with their decision and wait until the sheet is updated :)
1
0
5
@0x10n
Xion
4 years
Tweet media one
0
0
5
@0x10n
Xion
2 years
@SuperFashi1 @SuperGuesser I used Guacamole for RDP on a Windows VM, painful but doable :)
0
0
5
@0x10n
Xion
1 year
본선에도 이런 문제가 나올 생각 하니 벌써부터 "사회적 합의" 마렵네
1
0
5
@0x10n
Xion
2 years
@RBTree_ "So to me seems like a notorious coincidence" 🤡 Coincidence can happen, but it just highlights the lack of proper research into previous studies (or in this case, related chals) I really don't get it, why would anyone copy a chal on a public, competitive, properly sponsored CTF?
0
0
4
@0x10n
Xion
3 years
Meme generated by @c0m0r1
Tweet media one
0
1
4
@0x10n
Xion
2 years
Last 24h, 3 pwns still left!
@0x10n
Xion
2 years
Halfway through, 5 chals (3 pwn, 1 web, 1 crypto) still waiting for their first blood!
0
0
6
0
0
4
@0x10n
Xion
4 years
@pr0cf51 Wow God Himself came and tweeted me
0
0
4
@0x10n
Xion
2 years
$ echo "Redis RCE via mallctl extent_hooks" | md5sum As seen from 2022 Spring GoN Open Qual CTF "Trino: Mirai" :)
@0x10n
Xion
3 years
ac3ecc9651dbd50cc87e90fbab704f71
0
0
3
0
0
4
@0x10n
Xion
2 years
... all with great teammates. Many of the above chals were just me finding vulns and throwing my teammates PoCs since writing exploits and debugging takes forever on a smartphone keyboard :( I wrote the solvers for redis-lite and chirashi-sushi, others by teammates. (2/2)
0
0
4
@0x10n
Xion
6 months
990395e6ca255794b0474d79e8ea4c4c3f799a1fe9eb2dbcbfe93f16d508b358
0
1
3
@0x10n
Xion
4 years
CCE2020 babyshell, easyransom, keyboord, lost_treasure, simple_{cmdshell, pwn, rop, uaf} 풀었습니다... 중간에 실험 관련 준비로 어디 갔다온거 아니면 socks도 걸어볼 만한 솔브각인데 아쉽네요
1
1
4
@0x10n
Xion
3 years
ac3ecc9651dbd50cc87e90fbab704f71
0
0
3
@0x10n
Xion
2 years
@pr0cf51 @RBTree_ Hello, another newbie interested in trying out CTFs. I'm new to infosec stuff, where should I start from?
1
0
3
@0x10n
Xion
2 months
@5aelo Does the "Exploit requires JIT compilation" mean that it's exploitable in jitless mode, or simply that the bug/exploit does not directly involve a bug within JIT compilation? AFAIK jitless disables WASM, so I assume most of the WASM-related bugs would still require JIT?
1
0
3
@0x10n
Xion
4 years
...with the remaining 0.99 chals being eebpf, got AAR/W but had no firepower nor time left to do the remaining works 😭 Blind Shot was certainly a interesting chal, both because of the exploitation technique and because I've made an almost exactly same challenge... (2/n)
1
0
3
@0x10n
Xion
2 years
@c0m0r1 왜 나 빼고 해?왜 나 빼고 해?왜 나 빼고 해?왜 나 빼고 해?왜 나 빼고 해?왜 나 빼고 해?왜 나 빼고 해?왜 나 빼고 해?왜 나 빼고 해?왜 나 빼고 해?왜 나 빼고 해?왜 나 빼고 해?
1
0
3
@0x10n
Xion
4 years
@c0m0r1 회장해
1
0
3
@0x10n
Xion
2 years
4 days since CTF start, 3 pwnables still waiting for their First Blood! Try it out at
Tweet media one
@0x10n
Xion
2 years
CTF held internally by KAIST GoN is first being held open to all players on @dreamhack_io platform. The competition takes place in March 15 22:00 ~ March 22 21:00 (UTC+9). We've prepared about 20 chals ranging from baby to spicy, so enjoy!
2
1
2
1
1
3
@0x10n
Xion
3 years
@c0m0r1 또 기만이야
2
0
3
@0x10n
Xion
4 years
Working on renovating a server from Windows Server + VMWare Workstation to Proxmox VE. Quite easy to use as well as being super flexible 👍
Tweet media one
0
1
3
@0x10n
Xion
2 years
~31.5hrs left! Still no solvers for Trino: Rendezvous, Trino: Mirai, Showdown 🧐
Tweet media one
0
0
3
@0x10n
Xion
4 years
...which was going to be released in GoN internal CTF, but now since it's been released once again I might have to modify some parts 😏 TL;DR writeup: Vi deteriorated: C++ exception handling + elegant heap shaping Blind Shot: One-shot double-staged FSB (argv-flipping) (3/n)
1
0
3
@0x10n
Xion
3 years
@ptrYudai KiSystemServiceExit may be what you're looking for, although this requires you to fix the trap frame saved at rbp
1
0
3
@0x10n
Xion
3 years
self-sustained ctf is the future!
0
0
3
@0x10n
Xion
2 years
@diff72840089 Shoutout to diff just because I felt like doing so
0
0
3