text
stringlengths
0
1.99k
From its beginnings as a kind of subculture, to having thousands of
competitions worldwide, and even one-vs-one livestream battles [94] today,
CTF has undoubtedly become something pretty cool for many young hackers.
Of course, CTF itself has some issues that get criticized from time to
time - so even if you never play CTFs, that doesn't mean you can't be a
great hacker. But things aren't always black-and-white: whether it's
Binary Golfers [95] crafting ever-more elegant code, gamers using ACE
(Arbitrary Code Execution) to speedrun straight to the game credits [96],
or even pulling off remote code execution on a 25-year-old Game Boy Color
[97] - it's exactly because these challenges themselves are so fascinating
that they draw more people in, pushing technologies and skills to their
absolute limits!
I believe every generation has its own legendary stories. Whether it's
"taking over the organizer's crypto backdoor," anonymous fork bombs,
horrible-yet-effective binary patches, or those CTF dramas; whether it's
ingenious techniques born in CTFs, like Eye-Grepping binaries [98], the
dozens of "House of" techniques, or the insane arms race in frontend
security; or those hilarious stories and urban legends - like DDTEK's
obsession with sheep, observing tomcr00se up close, or even *accidentally*
hacking into another team's laptop... Just like the amazing stories shared
by @psifertex [99], I'm sure there must be more - I'm really looking
forward to seeing more people step up and share their own epic CTF
adventures! :)
Also, hats off to those who've shared all the ups and downs throughout my
CTF journey - cheers to HITCON CTF and to 217!
> jeffxx, atdog, dm4, lucas, winesap, shik, peter50216, jery,
> cebrusfs, ddaa, lays, angelboy, david942j, meh, lyc, hh, lsc,
> and our Big Alan!
--[ References
[1] Orange Tsai, https://blog.orange.tw/about/
[2] "2021 Top Routinely Exploited Vulnerabilities"
ERROR: type should be string, got " https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-117a"
[3] "SECCON CTF 2014: QR (Easy) Write-up"
ERROR: type should be string, got " https://yous.be/2014/12/07/seccon-ctf-2014-qr-easy-write-up/"
[4] Lays, "Google CTF Final 2017 - Slot Machine"
ERROR: type should be string, got " https://blog.l4ys.tw/blog/google-ctf-final-2017-slotmachine"
[5] Matt Borgerson (The Order of the Overflow)
"Port of the classic [FPS] DOOM to Xbox for DEFCON 27 CTF"
ERROR: type should be string, got " https://github.com/mborgerson/dc27-dooom"
[6] Lightning (Legitimate Business Syndicate), "cLEMENCy - Showing Mercy"
ERROR: type should be string, got " https://blog.legitbs.net/2017/10/clemency-showing-mercy.html"
[7] Mateusz "j00ru" Jurczyk, Gynvael Coldwind
"Pwning (sometimes) with style Dragons' notes on CTFs"
ERROR: type should be string, got " https://j00ru.vexillium.org/slides/2015/insomnihack.pdf#page=34"
[8] Julien "jvoisin" Voisin
"Paper notes: return-to-csu: A New Method to Bypass 64-bit Linux ASLR"
ERROR: type should be string, got " https://dustri.org/b/paper-notes-return-to-csu-a-new-method-to-bypass-"
64-bit-linux-aslr.html
[9] Angelboy, "HITCON CTF Qual 2016 - House of Orange Write up"
ERROR: type should be string, got " https://4ngelboy.blogspot.com/2016/10/hitcon-ctf-qual-2016-house-of-"
orange.html
[10] lollersk8ers, "Buffer overflow in handling of UNIX socket addresses"
ERROR: type should be string, got " https://www.freebsd.org/security/advisories/FreeBSD-SA-11:05.unix.asc"
[11] Jerry "pzread" Wu, "天衣無縫 ~ Fantastic Seamless Textile ~"
ERROR: type should be string, got " https://gist.github.com/pzread/2ae0bb3aa5fe0dc69fcf3257c41db944"
[12] david942j, "The elf in ELF - use 0-day(s) to cheat all disassemblers"
ERROR: type should be string, got " https://hitcon.org/2018/CMT/slide-files/d2_s1_r1.pdf"
[13] "The Month of PHP Security"
ERROR: type should be string, got " https://www.php-security.org/ (archived)"
[14] "Php Codz Hacking", https://github.com/80vul/phpcodz
[15] Adam Iwaniuk
"Overriding $ FILES array during uploading multiple files in php"
ERROR: type should be string, got " https://students.mimuw.edu.pl/~ai292615/php_multipleupload_"
overwrite.pdf (archived)
[16] "PHP Object Instantiation issues in HumHub (CVE-2015-1033)"
ERROR: type should be string, got " https://www.midnightblue.nl/blog/cve-2015-1033-humhub-"
php-object-instantiation-issues
[17] Arseniy Sharoglazov, "Exploiting Arbitrary Object Instantiations in
PHP without Custom Classes", https://swarm.ptsecurity.com/
exploiting-arbitrary-object-instantiations/
[18] Andrew, "Format String Vulnerability in Class Name Error Message"