I've released a beta version of
#pawnyable
, a website to learn advanced binary exploitation🐺🐱🐰🐼
Currently only the Linux Kernel chapter is about 90% complete😖
Other chapters and multilingual support are TODO😇
Here is how I used 1-day vulnerability for the sandboxed chromium to solve XSS challenges in PlaidCTF.
Thanks all the team members, especially
@po6ix
and
@ar9ang3
for the base idea and the web part.
Thank you for playing zer0pts CTF! 🐤
I wrote GitFile Explorer, Anti-Fermat, service, dreamland, q-solved, miniblog++, miniblog#, MathHash, 0AV, accountant, MemSafeD, sbxnote, kvstore, kRCE, redis-lite and wrote the server of Zer0TP.
It was the hardest weekend. I played 5 CTFs in 2 days and solved 22 pwnable tasks😫
Especially I liked
- sushi-da3 from TSG LIVE! 6 CTF
- klibrary from 3kCTF 2021
- puncher from m0leCon CTF 2021
Thank you for playing zer0pts CTF 2021!
I wrote Not Beginner's Stack, stopwatch, OneShot, safe vector, gorypt, nasm kit, GuestFS:RCE, GuestFS:AFR, Baby SQLi, infected, syscall 777, Not Beginner's Rev, spotlight, signme, and Tokyo Network.
My writeups for FireShell CTF 2020 🍣
It was my first webkit pwn and spent 16 hours on the single challenge, mostly because of gigacage + randomized structure id. Thank you
@FireShellST
for the nice pwn tasks!
I found a small technique to abuse template engine with prototype pollution and made a task in CakeCTF 2022. (Since I'm not familiar with web, I don't know if it's even new or useful.)
there were tons of things to learn when i started ctfs but recently i feel most of them boring. most of "hard" tasks are just time-consuming, not interesting, nothing to learn.
i'll refrain from playing ctfs as a pwner next year, bye.
i played google ctf in kijitora and i solved write-flag-where 1/2/3, ubf, gradebook, fastbox, lightbox, symatrix, turtle, png2.
one team unexpectedly hoarded flags and we lost the ticket to tokyo, but realized we're already in tokyo.
SecLang was the most time-consuming challenge to create in my CTF life. I had to design a new language, write an interpreter and compiler for it, make a good scoring system that no one can "cheat", adjust bugs and difficulty, and benchmark the system 😵
I created bomberman, babyheap 1970, elk, ReMOV, efsbk, call, landbox, and the concept of digicake for
#SECCON
CTF 2023 Finals🎄
Thank you for your participation!
I played PlaidCTF 2021 in uuunderflow and surprisingly I (with the help of web professionals) got 1st and only one blood for a web task.
Maybe I'll post how I pwned the sandboxed chrome crawler to leak the flag😉 Sorry for the unintended solution.
Again, we got only 1 solve for an XSS challenge by 1-day exploit in S4CTF😋
This time, I had to steal the cookie from the other domain and it was a really hard work...... but I learned a lot💪
Thank you
@S1r1u5_
for working on the XSS part!
I made my first XSS challenge in CakeCTF and some lessons learned.
- Put flag in cookie, not in UA
- Change domain for every XSS challenge
- reCAPTCHA can drop unintended solution
- XSS challenge is quite hard to make without unintended solution
Respect to web CTFers🥺
I,
@theoremoon
, and
@y05h1k1ng
are going to host CakeCTF (previously named InterKosenCTF) on August 28-29th. It aims to be a high quality CTF for intermediate and beginner CTFers. More information is coming soon.
Thank you for playing SECCON 2021!
I wrote
[misc] hitchhike
[pwn] kasu bof, gosu bof, pyast64++.pwn, kone_gadget
[rev] corrupted flag, pyast64++.rev, <flag>
I hope you like them😋
Congratz to Super Guesser, organizer, Balsn, and (o^_^o)!!!
Thank you for playing BSides AHM 2021!
I wrote the following tasks:
[pwn] BabyBOF:RCE, BabyBOF:SBX, httpsaba, padnote, shared knopte
[rev] intersection, King's License, Collapsed License, catflap
[cry] dlppp, floorsa
[web] entrance, (pwn part of) neutron
[mis] qunknown
The final match of Hackceler8 (GoogleCTF Final Event) is now over!
1st + $3k. PPP (
@PlaidCTF
)
2nd + $2k. I Use Bing
3rd + $1k. pasten (
@pastenctf
)
4th + $500. TFNS (
@FlatNetworkOrg
)
Congratz!
Our experimental speed-hacking competition is now over. Videos soon! GG :)
I wrote the following tasks for
#SECCON
CTF 2022 Finals:
diagemu, babyescape, Dusty Storage, Conversation Starter, Whisky, Paper House, Check in Abyss, a physical device challenge (Sniffer 1/2), and 2 KoH: SecLang and Heptarchy
My writeup for Defenit CTF 2020🍣
On solving Error Program I found a useful way to pwn _IO_list_all by overwriting dealloc_buffers! Thank you for the nice tasks🤗
I enjoyed HITCON CTF 2020 with GoN and Defenit🤗
I solved dual, atoms, telescope and helped teammates to pwn spark. After that, I'd been working on cgi but couldn't finish it because of `"]\x00` 😖
It makes me lose my motivation when CTF admin
- remove a challenge that is already solved for any reason
- open hint for a challenge that is already solved for any reason
That's extremely unfair.