c0nrad_jr Profile Banner
Stuart Larsen Profile
Stuart Larsen

@c0nrad_jr

Followers
1K
Following
537
Media
137
Statuses
618

(Inactive) Sloppy Joe Pirates guy Attempting to be the worlds greatest CTF player https://t.co/05SyrnTpnr Founder of https://t.co/gfXJ2k5X8z

Ann Arbor, MI
Joined November 2012
Don't wanna be here? Send us removal request.
@c0nrad_jr
Stuart Larsen
4 days
Built/ordered my first PCB! Make a little base health counter for Star Wars Unlimited.
0
1
2
@c0nrad_jr
Stuart Larsen
4 months
If you ever wanted to make a video ctf writeup, here's a little brain dump on how to get started: If you do record one, please send it to me! I'd love to check it out.
1
5
37
@c0nrad_jr
Stuart Larsen
4 months
Oh wow, unexpected, thank you @snyksec/@_JohnHammond for hosting the CTF and for the VR set!
Tweet media one
Tweet media two
3
0
34
@c0nrad_jr
Stuart Larsen
5 months
(Part 2), went back and did the heap sprays:
0
1
10
@c0nrad_jr
Stuart Larsen
5 months
I'm addicted to ~200 no BS challenges with writeups. I have done nothing but alpacahack challenges for the past week. I'll probs do some writeups on my favorite challenges in the future, but all of them are amazing.
3
13
118
@c0nrad_jr
Stuart Larsen
5 months
New video on exploiting a vulnerable kernel driver /w oob read/write to modprobe from checksumz/irisCTF:
2
13
78
@c0nrad_jr
Stuart Larsen
5 months
Do people have an intuitive sense of how algorithms such as pollard's p-1 works? Or is it more "ah, p-1 is smooth, time for pollard's p-1, hope it works".
0
0
3
@c0nrad_jr
Stuart Larsen
5 months
(I discuss the above in writeup video: ).
1
0
6
@c0nrad_jr
Stuart Larsen
5 months
Could someone build a search engine for CTF writeups?.
6
12
127
@c0nrad_jr
Stuart Larsen
5 months
Started uploading videos again: (first one on DNS rebinding from iris/web/webhook). Content should be roughly the same, but I'll probably only chat about chals I thought were neat instead of trying to do them all.
4
3
46
@c0nrad_jr
Stuart Larsen
5 months
So yeah, the STACK_TOP is randomized, and then the stack pointer (first frame) is randomized within the stack. Crazy stuff!. (Thanks to corg0 from buckeye for also investigating!).
1
0
3
@c0nrad_jr
Stuart Larsen
5 months
If the stack is already randomized, does additionally randomizing the starting Stack Pointer also help? I feel like I'm missing something, but going to stop there for now.
1
0
0
@c0nrad_jr
Stuart Larsen
5 months
There's a comment that mention "Hyper-Threading L1 cache evictions[1]. but I don't think that is the reason. It looks like it was reused as part of some ASLR upgrades[2][3]. [1] [2] [3]
1
0
0
@c0nrad_jr
Stuart Larsen
5 months
I *think* it is this. Now to find out why:.
1
0
1
@c0nrad_jr
Stuart Larsen
5 months
For zseries elf, but I think it still applies, "The system may also leave an unspecified amount of memory between the null auxiliary vector entry and the beginning of the information block.", tracking that down.
1
0
0
@c0nrad_jr
Stuart Larsen
5 months
To clarify further, not a variable in a stack frame. Something like *__libc_argv.
1
0
0
@c0nrad_jr
Stuart Larsen
5 months
Oh to clarify, this is not from an active CTF. Doing some research from a past challenge (sailing_the_c, buckeye2024).
2
0
0
@c0nrad_jr
Stuart Larsen
5 months
Vague question, but I'm having trouble finding an answer on google. Why is calculating the top of the stack from a stack leak unreliable? If you have a leak in libc and you know what the symbol is, you can calculate the base of libc. But with a stack, it's off by 0x1000 or so.
2
0
11
@c0nrad_jr
Stuart Larsen
6 months
Just a friendly reminder that MIT Battlecode starts tonight! It's not a security CTF, but it's super fun! Programming little autonomous agents, hacking java byte code, getting dunked on by college/high schools kids. All the fun things!.
0
0
22
@c0nrad_jr
Stuart Larsen
6 months
Some quick thoughts on why people shouldn't be too hard on themselves when it comes to CTFs.
5
60
231