Thanks to a challenge from
@angealbertini
, I made a "universal" build of DOOM that runs on everything from DOS 6 to Windows 95 & Windows 10 in a single, self-contained .exe (<1MB) using some file format trickery. Bring your own WADs!
When you finish a PhD in computer science, they take you to a special room and explain that you must never use recursion in real life. Its only purpose is to make programming hard for undergrads.
I discovered a bug in LocationSmart's API that allowed *anyone* to access *any phone's location* without any consent required. Works on major US carriers and even some Canadian ones. Utterly frightening stuff. Thanks
@briankrebs
for writing up the report.
Hello World! Aiyang and I are thrilled to announce our latest & greatest creation, Bernard Xiong Xiao! We can’t wait to see what exploits he gets up to in his future 😁
Just published my writeup for CPU Adventure at DSCTF, wherein me,
@zwad3
,
@thebluepichu
and
@jay_f0xtr0t
reverse engineered a program written for a completely unknown, custom CPU with no access to the CPU, emulator or any documentation:
For DEF CON 2018, we built a bit of assembly code that prints out shellcode in 8 different architectures: AMD64, Clemency, PDP-1, LGP-30, and several others. Check out how we did it:
Students in my security class joked they should just hack the server to change their grade to 100%, so I handed them my CSRF token for the gradebook and told them to have at it
I've just posted my writeup for the five-part SSTIC 2021 challenge here:
This was an amazing and very deep challenge and I learned a ton from doing it. Props to the
@sstic
organizers for putting it on!
We won DEF CON CTF for a third year in a row! I am awed by the skill and persistence of everyone on
@mmm_ctf_team
- as always, it was a blast hacking with y’all this weekend!
GG on GoogleCTF! Played with
@mmm_ctf_team
and got first :D
I got to try my hand at V8 pwn for the first time, solving WatTheWasm and getting the only solve on V8Box. I must admit it is pretty fun, and I look forward to more JS engine pwn in the future 😁
We are thrilled to announce "Layered Diffusion Brushes": a real-time training-free image editor powered by diffusion models. 🎨✨ This is new work from my PhD student Peyman Gholami
@peymo0n
.
Explore the interactive demo and check out more videos at:
I just finished the SSTIC 2021 CTF challenge. What an insane ride! I won’t spoil anything, but it’s a mix of reversing, binary exploitation and a bit of forensics that taught me a ton over the last couple of days. Definitely worth checking out if you want a tough challenge!
Félicitations à
@nneonneo
pour avoir résolu le challenge le premier !
Il reste deux places sur le podium rapidité, ne traînez pas ;)
Congratulations to
@nneonneo
for finishing the challenge first!
But you can still finish 2nd or 3rd, hurry up! ;)
@ghidraninja
pointed this out years ago; I'm just independently finding out late: . If you don't like this feature, you can untick "Embedded Media" (defaults to true!) during auto-analysis.
Samsung CTF: 4th of ~50 (individual contest), got a little special prize out of it. Flare-On: second finisher. All-in-all not a terrible way to spend a weekend in Korea :)
I had an amazing two days in Beijing playing
@RealWorldCTF
with PPP. A lot of incredibly interesting and fun challenges - looking forward to next year! And, in other great news, I just found out I had a paper accepted to
#chi2020
, so I’ll be going to Hawaii :)
I’ll be coming to Vegas for DEF CON this year! The baby’s doing great & will have lots of family to take care of him 😊. I’ll also aim to make it out to Pittsburgh for UIST & say hi to all the folks at CMU. After that I probably won’t be travelling for a little while!
MMM {
@maplebaconctf
,
@PlaidCTF
,
@theori_io
} collaborated to win DEF CON CTF this year! Super proud of everyone - a fantastic team effort - and an amazing showing for UBC’s own CTF team! I also really enjoyed the LiveCTF event - hope we’ll see more like that in future CTFs. gg!
I’m happy to announce that our CHI 2020 paper, “Phasking on Paper: Accessing a Continuum of PHysically Assisted SKetchING”, was awarded an Honorable Mention award! Congrats to the team and particularly Soheil Kianzad, the lead PhD author. Hope to see you all in Hawaii!
@thepacketrat
Using YAFU 1.34.3 and GMP-ECM 7.0.4, I just factored two 256-bit RSA keys on my 2019 MBP (laptop) in a total of 28 seconds - completely smoking Crown Sterling's claim. And YAFU is from 2015 - almost 4 years old...
for the full YAFU log.
This was a good week! Xincheng Huang’s paper on AR video telepresence has been accepted to ISMAR 2023, Anika Sayara’s paper on gesture authoring is conditionally accepted to UIST 2023, and despawningbone and I published CVE-2023-37271, a high severity vuln in RestrictedPython!
Finished the SSTIC 2023 challenge and submitted four
@ACMUIST
papers this week - staying busy! Definitely recommend checking out the SSTIC challenge - a good mix of cryptography, binary exploitation and even signal processing this year. Give it a try!
Félicitations à
@nneonneo
qui vient de terminer le premier le challenge SSTIC, pour la 3ème année d'affilée !
Il reste 2 places sur le podium rapidité !
This past weekend I was in Vegas playing DEFCON CTF, and just this morning I flew to lovely Vancouver to give a talk at SIGGRAPH 2018. It’s been a busy but fun 72 hours!
Had a blast at
#UIST2023
!
@AnikaSayara12
gave a great presentation on her project, GestureCanvas, which was joint with Emily Chen,
@gnouc_
and
@dw__yoon
! Looking forward to seeing everyone again at next year’s conference :)
@Pwn2Win
Hello! We (Maple Bacon) have solved your challenge. Flag: CTF-BR{1209cb9375c90526914480802a54c830d7665fd2718d8805c6a71ad5}. XMR address: 82hBWE6qZ39VQSRbKCE4pWMdqAgT6qdN55hdY63KyG9A5E3Yixn1HDy1QSX5d9ftH6BLyYkaGgaEA7K31NAfiHSWVPGAXCt. Thanks for the fun challenge!
So much stuff happened this last week - a successful
#chi2019
in Glasgow,
#defcon
#quals
(Maple Bacon takes 47th - a great result for our first time!), and the annual
@UBC_CS
faculty retreat - that I’ve entirely forgotten to actually tweet about any of it
In 2016, a good friend of mine told me that they didn’t need to vote b/c the polls said Hillary would win big. We were in PA - Trump won by less than 50k votes. If you want your desired outcome you’re going to have to get out there and vote!
Damn, I think I’m getting old. I’m finally at the age where my effectiveness drops off a cliff after 4-5am or so. Guess that means I can’t pull all-nighters any more :(
Life hack: I cut off my FIOS because I'm leaving soon, so I'm tethering to my iPhone. To get unlimited tethering speeds, I built a very quick & dirty SOCKS proxy app which forwards all my connections so they appear to come from the phone. Works great! 🎉🎉
And if you're curious, the issue itself was reported through usual disclosure processes and has now been fixed. But, any future bug in these providers will cause a whole new wave of trouble.
@playdotjs
Wow, play.js is really cool. Full Node.js environment on iOS. Heck, it’s so complete that I got a functioning iOS torrent client in a few lines of code thanks to WebTorrent.
MapleCTF is live! Come join us for the next 48 hours to solve challenges across a variety of categories and compete for over $2,250 USD in prizes.
Thanks again to our sponsors: Zellic, Offensive Security, Vector35, Trail of Bits, HackerOne, and Google!
Please check our paper, It got
#CHI2020
's honorable mention award:
Phasking on Paper: Accessing a Continuum of PHysically Assisted SKetchING | Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems
@cyanworlds
Decoded:
We all act because we're sure of what we want and we believe that the actions we perform will get us what we want.
but we never know anything for sure and so all our rationales are invented
to justify what we were going to do anyway before we thought of any reasons.
I’ll be chairing
#uist2020
session 3A in 15 minutes - come find out how we can track bodies & faces better using cameras! We will have three talks from Daehwa Kim, Dong-Hyun Hwang and Tuochao Chen (& al).
If you're at
#CHI2024
, come to 313A at 11:00am to see Michael Yin (
@yinsecurity1
)'s latest work on how lies and hallucinations within game narratives affect player perception and experience!
@thepacketrat
For 512, they quite disingenuously say 5 hours using "standard computing"; I initially thought they meant also using a laptop (which would be an advance over SotA), but now it's pretty clear they meant renting cloud compute. Factoring 512-bit was demo'd in 2015 in 4 hours on EC2.
@gf_256
begging for hints- guilty; guessing flags- yep, when we have most of a flag (e.g. AI challenge); abusing clusters- yup, we’re a uni team after all; renting VPS to brute- yup, renting nearby AWS for lower latency.
@unzap_
@angealbertini
In all likelihood this is a consequence of me using Chocolate Doom 2.2.1 rather than the latest version. I did this for Windows 95 compatibility. I could probably spin another build with a more recent Doom to fix it...
And done! The last challenge is just pure fun. Loved the whole thing and really enjoyed the challenges this year. Thanks
@nickharbour
and everyone else on the FLARE team for putting it on!
OMG there was a bug on their end...had the flag for
#9
two days ago but thought it was a fake. The challenge has several other fake flags in the correct format so I didn't think to check with the organizers...
Verizon intends to "terminate [LocationSmart and Zumigo's] ability to access and use our customers' location data as soon as possible" in the wake of my LocationSmart hack disclosure. Good start - ball's in your court
@ATT
@TMobile
@sprint
Dear
@Google
: If my GMail is over quota, Inbox should tell me. If my GMail is over quota, you should not randomly receive some emails but not others. I just found out I've been over quota - by an entire GB - and may have been for the past year. If I missed your email - I'm sorry.
Hey WolframAlpha, what's the solution to the simple equation $0 = \sin(a-x) + 2\sin(b-2x)$? (WolframAlpha) Here you go (note the scrollbar)
Trigonometry is hard.
@netspooky
import bisect; result = [bisect.bisect_left(nums, target), bisect.bisect_right(nums, target) - 1]
plus some O(1) finagling for the -1, -1 case
I love bisect. Every time I’ve ever needed to write a binary search I just read the source code for the module 😄
@balzarot
We actually solved the last level 15 minutes after the network closed on day 1! It was *extremely* fun to play - excellently done!
I've also just solved the fixed level 14 in 223 moves, so I suppose you can consider it tested now ;)