text stringlengths 0 1.99k |
|---|
From its beginnings as a kind of subculture, to having thousands of |
competitions worldwide, and even one-vs-one livestream battles [94] today, |
CTF has undoubtedly become something pretty cool for many young hackers. |
Of course, CTF itself has some issues that get criticized from time to |
time - so even if you never play CTFs, that doesn't mean you can't be a |
great hacker. But things aren't always black-and-white: whether it's |
Binary Golfers [95] crafting ever-more elegant code, gamers using ACE |
(Arbitrary Code Execution) to speedrun straight to the game credits [96], |
or even pulling off remote code execution on a 25-year-old Game Boy Color |
[97] - it's exactly because these challenges themselves are so fascinating |
that they draw more people in, pushing technologies and skills to their |
absolute limits! |
I believe every generation has its own legendary stories. Whether it's |
"taking over the organizer's crypto backdoor," anonymous fork bombs, |
horrible-yet-effective binary patches, or those CTF dramas; whether it's |
ingenious techniques born in CTFs, like Eye-Grepping binaries [98], the |
dozens of "House of" techniques, or the insane arms race in frontend |
security; or those hilarious stories and urban legends - like DDTEK's |
obsession with sheep, observing tomcr00se up close, or even *accidentally* |
hacking into another team's laptop... Just like the amazing stories shared |
by @psifertex [99], I'm sure there must be more - I'm really looking |
forward to seeing more people step up and share their own epic CTF |
adventures! :) |
Also, hats off to those who've shared all the ups and downs throughout my |
CTF journey - cheers to HITCON CTF and to 217! |
> jeffxx, atdog, dm4, lucas, winesap, shik, peter50216, jery, |
> cebrusfs, ddaa, lays, angelboy, david942j, meh, lyc, hh, lsc, |
> and our Big Alan! |
--[ References |
[1] Orange Tsai, https://blog.orange.tw/about/ |
[2] "2021 Top Routinely Exploited Vulnerabilities" |
ERROR: type should be string, got " https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-117a" |
[3] "SECCON CTF 2014: QR (Easy) Write-up" |
ERROR: type should be string, got " https://yous.be/2014/12/07/seccon-ctf-2014-qr-easy-write-up/" |
[4] Lays, "Google CTF Final 2017 - Slot Machine" |
ERROR: type should be string, got " https://blog.l4ys.tw/blog/google-ctf-final-2017-slotmachine" |
[5] Matt Borgerson (The Order of the Overflow) |
"Port of the classic [FPS] DOOM to Xbox for DEFCON 27 CTF" |
ERROR: type should be string, got " https://github.com/mborgerson/dc27-dooom" |
[6] Lightning (Legitimate Business Syndicate), "cLEMENCy - Showing Mercy" |
ERROR: type should be string, got " https://blog.legitbs.net/2017/10/clemency-showing-mercy.html" |
[7] Mateusz "j00ru" Jurczyk, Gynvael Coldwind |
"Pwning (sometimes) with style Dragons' notes on CTFs" |
ERROR: type should be string, got " https://j00ru.vexillium.org/slides/2015/insomnihack.pdf#page=34" |
[8] Julien "jvoisin" Voisin |
"Paper notes: return-to-csu: A New Method to Bypass 64-bit Linux ASLR" |
ERROR: type should be string, got " https://dustri.org/b/paper-notes-return-to-csu-a-new-method-to-bypass-" |
64-bit-linux-aslr.html |
[9] Angelboy, "HITCON CTF Qual 2016 - House of Orange Write up" |
ERROR: type should be string, got " https://4ngelboy.blogspot.com/2016/10/hitcon-ctf-qual-2016-house-of-" |
orange.html |
[10] lollersk8ers, "Buffer overflow in handling of UNIX socket addresses" |
ERROR: type should be string, got " https://www.freebsd.org/security/advisories/FreeBSD-SA-11:05.unix.asc" |
[11] Jerry "pzread" Wu, "天衣無縫 ~ Fantastic Seamless Textile ~" |
ERROR: type should be string, got " https://gist.github.com/pzread/2ae0bb3aa5fe0dc69fcf3257c41db944" |
[12] david942j, "The elf in ELF - use 0-day(s) to cheat all disassemblers" |
ERROR: type should be string, got " https://hitcon.org/2018/CMT/slide-files/d2_s1_r1.pdf" |
[13] "The Month of PHP Security" |
ERROR: type should be string, got " https://www.php-security.org/ (archived)" |
[14] "Php Codz Hacking", https://github.com/80vul/phpcodz |
[15] Adam Iwaniuk |
"Overriding $ FILES array during uploading multiple files in php" |
ERROR: type should be string, got " https://students.mimuw.edu.pl/~ai292615/php_multipleupload_" |
overwrite.pdf (archived) |
[16] "PHP Object Instantiation issues in HumHub (CVE-2015-1033)" |
ERROR: type should be string, got " https://www.midnightblue.nl/blog/cve-2015-1033-humhub-" |
php-object-instantiation-issues |
[17] Arseniy Sharoglazov, "Exploiting Arbitrary Object Instantiations in |
PHP without Custom Classes", https://swarm.ptsecurity.com/ |
exploiting-arbitrary-object-instantiations/ |
[18] Andrew, "Format String Vulnerability in Class Name Error Message" |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.