kunte_ctf Profile Banner
kunte_ Profile
kunte_

@kunte_ctf

Followers
267
Following
463
Media
2
Statuses
175

CTF Player with @FluxFingers | Ph.D. Student

Germany
Joined May 2009
Don't wanna be here? Send us removal request.
@fluxfingers
FluxFingers
2 months
Shop is closed! We hope you had a lot of fun playing this year’s Hack.​lu CTF! Congratulations to everybody who solved challenges and especially the winners: πŸ₯³ Congrats to the winners! πŸŽ‰ πŸ’ͺ πŸ₯‡ @kalmarunionenDM πŸ₯ˆ @justCatTheFish πŸ₯‰ @0rganizers https://t.co/e8nHgLE8B8
2
6
28
@fluxfingers
FluxFingers
3 months
Hej! We are thrilled to announce @hack_lu CTF 2025 starts on Friday, October 17. Top teams can win prizes from our sponsors: OffensiveCon, Zellic, PortSwigger, Binary Ninja, and HackTheBox. All information on https://t.co/7RrfeQKgHV
0
7
23
@fluxfingers
FluxFingers
1 year
Hacklu CTF is still running for ~23h! We still have some unsolved challenges, including: - πŸ“±Android Flutter exploitation - 🦊 2 webs with Firefox bots - πŸ’ pwning a 17 year old SpiderMonkey - ✍️ LaTeX madness Come play:Β  https://t.co/7RrfeQJISn
1
4
31
@kunte_ctf
kunte_
1 year
Webs Webs Webs Webs Webs
@fluxfingers
FluxFingers
1 year
πŸ‹οΈ Time to warm up your muscles for @hack_lu CTF! We hope you didn't skip flag day, otherwise you'll be sweating trying to catch up πŸ₯΅ CTF starts Oct 18, 18:00 UTC, registration is now open: https://t.co/j2T7ZcL6X0
0
0
9
@realansgar
realansgar
1 year
I found XSS in Roundcube and released a new announcement blog post about it today. Already excited to share the full details in a few weeks after people patched :)
@Sonar_Research
Sonar Research
1 year
Critical XSS in Roundcube webmail⚠ A victim only has to view a malicious email. As reported by @ESETresearch, APTs have exploited similar vulns in the past to steal government emails. Our announcement: https://t.co/fOa2l0ujwV (CVE-2024-42008, CVE-2024-42009, CVE-2024-42010)
0
3
25
@pspaul95
pspaul
1 year
Super excited to present this research at DEF CON! If you think SQL Injections have become a boring and repetitive topic, think again. There's a whole new layer to explore πŸ‘€
@albinowax
James Kettle
1 year
SQLi via... binary protocol smuggling?! This upcoming #defcon32 talk from @pspaul95 & @Sonar_Research sounds awesome! https://t.co/wW018bxT6t
4
23
190
@fh4ntke
Florian
2 years
Can server-side scanning research be legal and ethical? For our upcoming @IEEESSP paper "Where are the red lines?" we talked to experts on law and ethics, and web operators. We discussed challenges, solutions and various fictional research scenarios. https://t.co/cTjFfiVRRl
4
14
46
@fluxfingers
FluxFingers
2 years
Hacklu CTF is running at full steam with still ~23h left! 🚩 We got some great challenges waiting for you, including a 28-year-old 0-day in SSH, a Mastodon n-day, a QEMU escape, and many many more. Come try your luck πŸŽ±πŸ‘‰
0
4
25
@fluxfingers
FluxFingers
2 years
The game is on! You have 48h to prove your luck πŸ‘‰ https://t.co/7RrfeQJISn
1
9
40
@pspaul95
pspaul
2 years
Super excited to publish this blog post! One of the most fun bugs I exploited so far, had to get creative and lose my mind reading the CSS spec for 2 days πŸ™ƒ
@Sonar_Research
Sonar Research
2 years
Stolen with Style: Dive into our technical writeup of a complex Cross-Site Scripting vulnerability we discovered in Proton Mail! Be ready for a story about parser differentials, sandbox bypasses, and CSS data exfiltration: https://t.co/C6x8OqWXNw #security #appsec #cleancode
4
15
46
@DominikNo1
Dominik Noß
3 years
Our paper "Finding All Cross-Site Needles in the DOM Stack - A Comprehensive Methodology for the Automatic XS-Leak Detection in Web Browsers" got accepted at ACM CCS 2023! @acm_ccs The camera-ready version will be available at https://t.co/E7PcJYlJTi. Tool will be on GitHub.
1
2
10
@lambdafu
-
3 years
✨Our paper "Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser" will appear at USENIX Security '23 and is now available as a preprint: https://t.co/rp4DqVmXqV This work is by Matthias Gierlings, me (@lambdafu), and @JoergSchwenk πŸ§΅πŸ‘‡
1
6
21
@kunte_ctf
kunte_
3 years
Just for completeness here is my solve script: https://t.co/XyYCi4Mn8z For anyone that wants another challenge try exploit this, with mysql instead of sqlite. 😈
@terjanq
terjanq
3 years
Helped @justCatTheFish with yet another ctf and solved two highest scored challenges: HTPL from @BitK_ and foodAPI from @kunte_ctf. The former was a JS sandbox escape and the latter was about 0day in #denodb. Some useful tricks πŸ™ƒ https://t.co/3IqqiupHAi #hacklu @fluxfingers
0
2
16
@terjanq
terjanq
3 years
Helped @justCatTheFish with yet another ctf and solved two highest scored challenges: HTPL from @BitK_ and foodAPI from @kunte_ctf. The former was a JS sandbox escape and the latter was about 0day in #denodb. Some useful tricks πŸ™ƒ https://t.co/3IqqiupHAi #hacklu @fluxfingers
Tweet card summary image
gist.github.com
Hack.lu 2022 CTF solutions. GitHub Gist: instantly share code, notes, and snippets.
1
16
114
@fluxfingers
FluxFingers
3 years
The Hacklu 2022 CTF is over! Thank you for playing! Of course special congrats to the top 3 teams! πŸ₯³ πŸ† πŸ₯‡ organizers πŸ₯ˆ justCatTheFish πŸ₯‰ πŸ’¦ CTF: https://t.co/rbPY4FAEo3 Challenges will still be up for a while. See you next Year! #hacklu #ctf @fluxfingers
1
6
47
@fluxfingers
FluxFingers
3 years
Less than 24h until Hacklu CTF 2022 and the registration is now open! Sign up at https://t.co/7RrfeQJISn and prepare yourself for the finest hacking. #Hack_lu #CTF
0
9
19
@terjanq
terjanq
3 years
#GoogleCTF is over! This year I prepared a race-condition based challenge which was a combination of #xsleaks #xss and other interesting client-side bugs. The challenge was solved by 10 teams and had unintended solutions, some of which are awesome! 😊 https://t.co/okdH1sHh1c
Tweet card summary image
gist.github.com
Postviewer challenge writeup from GoogleCTF 2022. GitHub Gist: instantly share code, notes, and snippets.
4
57
219
@kunte_ctf
kunte_
4 years
I would like to thank my co-authors @CheariX, @mniemietz, @DominikNo1, @JoergSchwenk and everyone at the NDS Chair. β™₯️
1
0
1