![5unkn0wn Profile](https://pbs.twimg.com/profile_images/1725448444834349056/fD9o4SWz_x96.jpg)
5unkn0wn
@5unKn0wn
Followers
1K
Following
3K
Statuses
442
Taeyang Lee, a security researcher at @theori_io.
Seoul, Republic of Korea
Joined February 2017
@mrexodia @BackEngineerLab All obfuscated functions are composed of huge loop-based MBA instructions. However, through identifying meaningful register (or memory) access near the first access point, we can reveal each MBA's input/output patterns. This allows us to analyze the original algorithm efficiently
0
0
10
gg
Theori, 2024 ์ฌ์ด๋ฒ๊ณต๊ฒฉ๋ฐฉ์ด๋ํ(CCE) ์ข
ํฉ์ฐ์น ๐ CCE ์ผ๋ฐ๋ถ์ ์ฐธ์ฌํ ํฐ์ค๋ฆฌ 4๊ฐ ํ์ด 1, 2, 3, 4๋ฑ ๋ชจ๋ ์ฐจ์งํ์ต๋๋ค! ๐ฅ ์ข
ํฉ์ฐ์น 'The Duckling': @junorouse, @5unKn0wn, @_bincat, ์ฑํด๋น ๐ฅ ์ผ๋ฐ๋ถ ์ฐ์น 'The Gosling': ๊ฐ์ฐ์, @RBTree_, @yechan_bae, ๊นํํ ๐ฅ ์ผ๋ฐ๋ถ ์ค์ฐ์น 'GYG': @s0ngsari530, @bbbig12 ๐ ์ผ๋ฐ๋ถ ์ฅ๋ ค '๊ตฐํ': @imssm99 ํฐ์ค๋ฆฌ ์ธํด๋ค๋ ์ฒญ์๋
๋ถ๋ฌธ์์ ์ฐ์ํ ์ฑ์ ์ ๊ฑฐ๋์ต๋๋ค. ๐ฅ ์ฒญ์๋
๋ถ ์ค์ฐ์น '๋ฅ์ฝ': ๊ถ์จ, ๋งน์ํ ๐ฅ ์ฒญ์๋
๋ถ ์ฅ๋ ค '์์ฌํ์์ป์ด๋จน์ด์': ๋์์ค ์ด๋ฒ ์ฐ์น์ผ๋ก ํฐ์ค๋ฆฌ๋ ์ง๋ 2019๋
-2022๋
์ข
ํฉ์ฐ์น, 2023๋
์ผ๋ฐ์ฐ์น์ ์ด์ด 6๋ฒ์งธ ์ฐ์น์ ๋ฌ์ฑํฉ๋๋ค! ์ฌ์ด๋ฒ๊ณต๊ฒฉ๋ฐฉ์ด๋ํ(CCE)๋ ๊ตญ๊ฐ์ ๋ณด์ ์ฃผ์ต, ๊ตญ๊ฐ๋ณด์๊ธฐ์ ์ฐ๊ตฌ์๊ฐ ์ฃผ๊ดํ๋ ๊ตญ๋ด ํดํน๋ฐฉ์ด๋ํ์
๋๋ค. ํฐ์ค๋ฆฌ๋ ๊ตญ๋ด์ธ CTF์์ ์ฐ์นํ๋ฉฐ ์ธ๊ณ ์ต๊ณ ์ ์ฌ์ด๋ฒ ๋ณด์ ์ญ๋์ ๋์์์ด ์
์ฆํ๊ณ ์์ต๋๋ค. ์ฐธ์ฌํ์ ๋ชจ๋ ๋ถ๋ค ๊ณ ์ํ์
จ์ต๋๋ค. #Theori #ํฐ์ค๋ฆฌ #CCE #CTF #Winner #Hacking #Hacker #Cybersecurity
0
1
14
Fav chall: Helium implements ephemeral key exchange through slightly modified libhydrogen. The most painful but fun part was analyzing whole inlined sse3 functions and identifying modified algorithms. After exchanging the key, we can read the flag via arbitrary file read vuln๐
๐ Theori Wins DEF CON 32 CTF and DARPA AI Cyber Challenge (AIxCC) Semifinals!ย ๐ We are thrilled to announce that Theori has once again emerged victorious at DEF CON 32 CTFโthe world-renowned "Hacker Olympics"! With this win, Theori secures its 8th overall victory and an unprecedented three consecutive titlesโthe most in DEF CON history! DEF CON CTF is the largest and most prestigious hacking defense competition in the world, attracting the brightest cybersecurity talents globally. Theori's CTF team, The Duck, teamed up with Maple Bacon from @UBC and PPP from @CarnegieMellon to form the record-breaking team Maple Mallard Magistrates (MMM). But wait, there's more! Riding the wave of our DEF CON victory, Theori has also advanced to the finals of the AIxCC competition, an AI Cyber Challenge hosted by Defense Advanced Research Projects Agency (@DARPA ). Out of countless competitors, only 7 teams made it to the finals, and we're proud to be among them, securing a $2 million prize. This double achievement is more than just a recordโit's a testament to Theori's unrivaled expertise in cybersecurity and our unwavering drive to push the boundaries of innovation. A huge shoutout to all the amazing teams who made it to the finals for both DEF CON and AIxCCโyou all brought fierce competition! And a big thank you to the organizers who make this event outstanding every year. What's next? As we celebrate this historic win, we're already gearing up for the next big challenge. Stay tuned for more groundbreaking innovations from Theori! #DEFCON32 #DEFCONCTF32 #Theori #Cybersecurity #TheDuck #MMM #AIxCC #DARPA #HackerOlympics
0
0
29
Ran priority scheduling for playing multiple ctf ๐คญ
Two birds with one stone? Nah more like two CTFs with one duck! ๐๐ฆ Theori sweeps both the @BSidesSF CTF and @defcon qualifiers at the top of the leaderboard! Congrats to our teams #TheDuck and #MMM for first place! Curious what these genius hackers are further capable of? Check out our newest security solution at @RSAConference Booth 634! #Theori #ํฐ์ค๋ฆฌ #DEFCON #BsidesSF #BsidesSF2024
1
1
25
RT @binarly_io: ๐จBreaking news from the lab: Finding the Hidden Threats Posed by Dead and Vulnerable Code Primitives Our REsearch team higโฆ
0
18
0
RT @theori_io: Do you use a virtual machine to browse dangerous links safely? If you use the Chrome browser inside that virtual machine, isโฆ
0
267
0
@junorouse @YQ996CO28254695 @fenbushi @titanbuilderxyz @ultrasoundmoney @sui414 @flashbotsmev @TenderlyApp eat, sleep, pwn, repeat ๐
0
0
1
RT @Blackhatmea: ุฃูู ู
ุจุฑูู ููุฑูู The Duck ุงููุงุฆุฒ ุจุงูู
ุฑูุฒ ุงูุซุงูู ูู ู
ุณุงุจูุฉ #ุงูุชูุท_ุงูุนูู
ุถู
ู ูุนุงููุฉ #ุจูุงู_ูุงุช23ุ ูุฌุงุฆุฒุฉ 200,000 ุฑูุงู ๐๐ป๐๐ป @Nโฆ
0
6
0