SIGFLAG_CTF Profile Banner
SIGFLAG Profile
SIGFLAG

@SIGFLAG_CTF

Followers
184
Following
77
Media
22
Statuses
55

CTF Team of @jkulinz

Linz, Österreich
Joined March 2017
Don't wanna be here? Send us removal request.
@We_0wn_Y0u
We_0wn_Y0u
4 months
We played @MidnightSunCTF this weekend and took 1st place as a merged team with @LosFuzzys and @SIGFLAG_CTF! Excited to meet all the other finalists in Stockholm for the MIDNIGHT SUN Finals Huge thanks to @HackingForSoju for organizing the CTF and keeping it fun right to the end
Tweet media one
0
6
17
@blu3r4y_at
Mario Kahlhofer
2 years
Peak from #glacierctf was a challenge with three ingredients: (1) An XSS vulnerability, but with (2) a strict CSP that made it impossible to include external JS scripts, and (3) a bullet-proof implementation of an image upload contact form. We hacked it anyway. Read on. (1/5)
1
1
4
@LosFuzzys
LosFuzzys
2 years
9th place at SaarCTF together as KuK Hofhackerei with @SIGFLAG_CTF @We_0wn_Y0u @TeamAustriaECSC and more! Thanks @saarsec for organizing, @JoePichlmayr and CSA for sponsoring accomodations for our guests, and IAIK @tugraz for providing the space!
Tweet media one
0
8
23
@SIGFLAG_CTF
SIGFLAG
2 years
Learn a few things about ext4 and Java decompilation in a new blog post by our teammate Robert on the recently released @sadservers_com SRE/DevOps challenges Kihei and Belo Horizonte
sigflag.at
A walkthrough through a new set of SRE/DevOps challenges
0
0
3
@SIGFLAG_CTF
SIGFLAG
3 years
Big shout-out to @daho_at for being the first one in our team to get into the CVE index! ;)
@daho_at
Daniel Hofer
3 years
CTFs can result in real-world improvements like this year's pbctf. The result: CVE-2023-25825 ( https://t.co/tkYyZti1fv) found by @SIGFLAG_CTF on @zoneminder
0
0
2
@SIGFLAG_CTF
SIGFLAG
3 years
New audio data decoding write-up by our team mate Daniel on decompressme-2 from pbctf 2023 @pb_ctf
sigflag.at
Reverse Engineering of an unknown audio codec.
0
0
3
@SIGFLAG_CTF
SIGFLAG
3 years
New blog post by our teammate Robert on the recently released @sadservers_com SRE/DevOps challenges Pokhara and Roseau
sigflag.at
A walkthrough through a new set of SRE/DevOps challenges
0
0
2
@SIGFLAG_CTF
SIGFLAG
3 years
Let's kick-off 2023 with a comprehensive write-up by Robert Führicht on the @sadservers_com SRE/DevOps challenges
sigflag.at
A walkthrough through a set of SRE/DevOps challenges
0
0
4
@InfoSecIITR
InfoSecIITR
3 years
And Backdoor CTF 2022 comes to an end! Congrats to the winning teams 🎉 #Drovosec, @BlackB6a, @SIGFLAG_CTF Thanks everyone for participating and see you next year ❤️
Tweet media one
0
3
13
@SIGFLAG_CTF
SIGFLAG
3 years
Want to play some CTFs in the upcoming weeks? Join SIGFLAG on-site in Linz when we participate in #HITCONCTF2022 (26.11, today), do a TryHackMe beginner session (07.12) or attend the bi0sctf (17.12) - details at
0
2
0
@SIGFLAG_CTF
SIGFLAG
3 years
THANKS to 100+ hackers that visited our BECOME A HACKER workshop today! This was AMAZING! Shoutout to Jürgen Weiss from ARES CI & @Dynatrace & @epunkt_com for sponsoring us. See you at the next competition!
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
9
20
@SIGFLAG_CTF
SIGFLAG
3 years
Wow, your interest in our workshop is amazing!! Due to an update of our compression algorithm we now have even more free seats for you!
sigflag.at
SIGFLAG is looking for new members. And we want to let you get a taste of hacker air.
0
1
5
@SIGFLAG_CTF
SIGFLAG
3 years
Missing the taste of hacker air? We start the new semester with the 2nd edition of our beginner-friendly IT security workshop. Register for free! https://t.co/i68o5sTDpd
Tweet media one
0
5
6
@FemaleCodersLnz
Female Coders Linz
3 years
We are looking forward to our very first hackathon! It will take place on September 17th in the GRAND GARAGE at the Tabakfabrik Linz. Please register at https://t.co/DElcvFvTHz
Tweet media one
0
2
3
@blu3r4y_at
Mario Kahlhofer
3 years
Even an up-to-date #log4j 2.17.2 didn't stop us from extracting secrets from the environment. Read how we used a ReDoS side channel attack in #GoogleCTF
Tweet card summary image
sigflag.at
Even with the latest Log4j version, some injection attacks are still possible
2
82
233
@blu3r4y_at
Mario Kahlhofer
6 years
Had a lot of fun escaping the maze on the final day of @OverTheWireCTF - check out my write-up if you are curious
sigflag.at
Programmatically escaping from a maze with Trémaux and dead-end filling
0
2
5
@SIGFLAG_CTF
SIGFLAG
6 years
Merry Christmas everyone! As a special we play the Musical Stegano challenge from @OverTheWireCTF on real synthesizers. Enjoy! :)
0
2
3
@SIGFLAG_CTF
SIGFLAG
6 years
#ructfe2019 was a great pleasure! Thanks to @RuCTFE ! And here is the write-up for the single flag in engine that we stole from NARF! ;)
sigflag.at
How to get first blood without understanding the service. Take 2.
1
1
9
@SIGFLAG_CTF
SIGFLAG
6 years
Our team member @_mroland wrote about exploiting Buggy .Net from #hitconctf ;)
sigflag.at
This style of exception handling should certainly make you suspicious!
0
0
2
@jkulinz
JKU - Johannes Kepler Universität Linz
6 years
Informatik-Studierende der JKU @SIGFLAG_CTF und der FH Hagenberg qualifizierten sich für das Finale des internationalem „Hacker“-Wettbewerbs @VolgaCTF. 📷 oben: Markus Vogl, Tobias Höller; unten: Mario Kahlhofer, Thomas Pointhuber
Tweet media one
3
7
27