CVE-2023-3390: UAF on Linux Netfilter nftables MFT_MSG_NEWRULE leads to LPE.
We exploit this tiny 1-day vuln to pwn all targets of Google's kernelCTF for the first time in history.
Nice and clear triple-kill 🥳
Update - We received a generous $67,837 in bounties from kernelCTF program, and have been selected speakers for POC2023 conference to share our experience! Stay tuned for our (hopefully) rich and insightful talk!
KAIST GoN에서 주최하는 내부 Qualification CTF가Dreamhack 플랫폼에서 최초로 공개 개최됩니다!
CTF는 3월 15일부터 7일간 진행될 예정이며, 동아리원을 제외한 상위 15명의 참가자 분들께는 소정의 상품도 준비되어있으니 많은 참여 부탁드립니다!!
According to history, Zhuge Liang is the first hacker who exploited the type confusion vulnerability, which occurred between mantou (dumpling) and human heads
zer0pts CTF is done! 2nd place with K-students (KaisHack GoN X PLUS X CyKor), solve 2 chals(not-beginners-rev, signme) with our teammates. great works guys!
- Got the flu
- Forced to quarantine
- Realize that I need to suffer at Christmas alone
- Realize again that this will continued in the rest of my life
2022 Fall GoN Open Qual CTF가 긴 여정 끝에 막을 내렸습니다!
Zero Gravity, Bomblab - Hard, pprintable, Obstacle, Exploit Tycoon, Checkers를 출제했습니다.
고생하신 출제자 분들, 본 대회를 후원해주신 KAIST GSIS &
@CSRC_KAIST
,
@dreamhack_io
, 그리고 모든 참가자분들께 감사드립니다!
2022 Fall GoN Open Qual CTF ended. I hope you enjoyed my challenges, baby-hexagon (Pwn) & dlmalloc (Pwn). Thank you to our participants, GoN members, and our sponsors, KAIST GSIS &
@CSRC_KAIST
!
Thanks to
@0x10n
for outstanding collaboration on COS exploit & post-exploit analysis, and
@insu_yun
& KAIST Hacking lab for unwavering support and encouragement!
2020 사이버작전경연대회가 마무리되었습니다!
모두들 대회 수고하셨습니다 :)
저는 일반부 예선 Voice Encryptor - analyze/exploit, Protein Analyzer
일반부 본선 Drone FCS, Official Document 문제를 출제했습니다.