text stringlengths 0 1.99k |
|---|
2. One `unserialize()` to Rule Them All |
2.1 - The "Serialize-Then-Replace" Pattern |
2.2 - Sleepy Cats Catch No Mice |
2.3 - The "Holy Grail" of Deserialization Attacks |
3. When Windows Breaks... |
3.1 - Windows Path Madness |
3.2 - Let's Make Windows Defender Angry! |
4. New Attacks and Techniques Born in CTFs |
4.1 - Twenty Years of Evolving LFI to RCE |
Level 0 - The LFI Arms Race |
Level 1 - The End of LFI |
Level 2 - The End of AFR |
Level Max - Filter Chain ~After Story~ |
4.2 - PHAR Deserialization |
Level 0 - What is PHAR? |
Level Max - Laravel (w/ mPDF) Kill Chain |
5. Participants Also Popped 0days |
5.1 - Hack the Scoreboard! |
5.2 - From CTF to Real World! |
> Epilogue |
- Honorable Mention |
- Hats off to the CTF Community |
> References |
--[ Prologue |
We all play different roles throughout our lives. I was fortunate enough |
to discover my passion early - and even luckier to make a living out of |
it. Before becoming a full-time hacker, I was also a script kiddie causing |
trouble, a young guy thirsty for bigger thrills, and a bug hunter chasing |
higher bounties. And now, I can proudly call myself a "hacker." All these |
experiences - whether good or bad - have truly shaped who I am today, and |
this article shares one chapter of my life - the days when I was competing |
full-time in "hacking competitions!" |
----[ > About Me |
Hi, I'm Orange Tsai. I guess many of you probably know me from my |
vulnerability research [1]. Maybe you've also heard my name mentioned as a |
Pwn2Own champion, a Pwnies Awards winner, or even spotted my bugs on the |
KEV (Known Exploited Vulnerabilities) list - like those in Microsoft |
Exchange Server, SSL VPNs, and most recently, Apache HTTP Server. I'm not |
really sure if this is something I should be proud of, but out of the top |
15 bugs hackers exploited most in 2021 [2], around 60% were discovered and |
reported by me... (sigh) |
----[ > Hacking Competitions |
It's been about 18 years since I first came across these so-called |
*hacking competitions*. Back then, those competitions - or Wargames, as we |
called them - weren't nearly as competitive as today's CTFs. Instead, they |
were more about passing down knowledge and, you know, just having fun. So |
all sorts of niche topics - whether from computer science, hacking skills, |
math, or even hacker culture - could become challenges, as long as geeks |
thought they were cool enough! |
So even today, after all these years, I still vividly remember those |
carefree days when I could simply explore new things. Every day I'd look |
forward to learning something new - no matter how useful or useless - |
diving deep into subjects just to solve one simple question, and getting |
excited about every tiny step forward. Just learn, hack, enjoy - then |
repeat! |
I still remember those days when I was hooked like it was an online game - |
staying up day and night climbing ranks on the leaderboards. At that time, |
I'd do anything to solve those challenges - even printing them out and |
shamelessly asking my math teacher for help. You know, for someone who |
wasn't exactly a typical "good student," that wasn't easy. Anyway, I tried |
everything I could think of, but nothing worked, and my ranking stayed |
stuck for a long time - until one day, I realized that the answer format |
wasn't as strict as I'd thought. That meant I could just skip the hardest |
part of the polynomial - and finally got the right answer! |
That was the first time - at least as far as I remember - that I felt the |
joy of solving problems in a clever way. It was also the first moment I |
clearly realized that, just by paying attention to a few more details, |
even someone like me could crack problems that the pros called impossible. |
This kind of "thinking outside the box" really had a huge impact on my |
life afterward! |
----[ > Being a Pro CTF Gamer |
I've spent a huge part of my life playing these games, which we now call |
"CTF." For those unfamiliar with this term, here's a quick explanation: |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.