Subatomic Traffic Controller. CEO of a company making MMO bots. Author of "Game Hacking". Senior Architect @ Cylance. Ex Bromium. Read more on the About page.
It's been a few months since me and my team started practicing CTF again, and we finally played in a live CTF over the weekend. It was a a fun CTF, and we actually managed to place above PPP with a team of only three people. I mean, it's clear
I'm on vacation in Mexico this week, which essentially means blow off pool time and hack stuff. I decided a relatively simple challenge would be a good starting point for the week, since I've never CTFed on this laptop and I was expecting to be constantly interrupted by vacation conversation
And there goes another night spent honing my CTF skills. This time, I decided to tackle pwnables Note challenge for 200 points. Check out my SECURITY PATCH for mmap(). despite no-ASLR setting, it will randomize memory layout. so it will contribute for exploit mitigation. wanna try sample application? ssh note@
Recently, me and Vadim decided to tag-team a 500 point challenge on pwnable called malware: I have no respect for writing malware but I do have respect for writing cool malware lets find a way to beat ANUBIS (https://anubis.iseclab.org) download : http://pwnable.kr/bin/malware.py Running
It's been nearly a year since I played my last competitive Capture The Flag (CTF); life has kept me busy and I haven't had time to practice much. Recently, me and a buddy decided to start practicing again so that we could get back to competing in the near future.