kunte_
@kunte_ctf
Followers
267
Following
463
Media
2
Statuses
175
CTF Player with @FluxFingers | Ph.D. Student
Germany
Joined May 2009
Shop is closed! We hope you had a lot of fun playing this yearβs Hack.βlu CTF! Congratulations to everybody who solved challenges and especially the winners: π₯³ Congrats to the winners! π πͺ π₯ @kalmarunionenDM π₯ @justCatTheFish π₯ @0rganizers
https://t.co/e8nHgLE8B8
2
6
28
Hej! We are thrilled to announce @hack_lu CTF 2025 starts on Friday, October 17. Top teams can win prizes from our sponsors: OffensiveCon, Zellic, PortSwigger, Binary Ninja, and HackTheBox. All information on https://t.co/7RrfeQKgHV
0
7
23
Hacklu CTF is still running for ~23h! We still have some unsolved challenges, including: - π±Android Flutter exploitation - π¦ 2 webs with Firefox bots - π pwning a 17 year old SpiderMonkey - βοΈ LaTeX madness Come play:Β https://t.co/7RrfeQJISn
1
4
31
Webs Webs Webs Webs Webs
ποΈ Time to warm up your muscles for @hack_lu CTF! We hope you didn't skip flag day, otherwise you'll be sweating trying to catch up π₯΅ CTF starts Oct 18, 18:00 UTC, registration is now open: https://t.co/j2T7ZcL6X0
0
0
9
I found XSS in Roundcube and released a new announcement blog post about it today. Already excited to share the full details in a few weeks after people patched :)
Critical XSS in Roundcube webmailβ A victim only has to view a malicious email. As reported by @ESETresearch, APTs have exploited similar vulns in the past to steal government emails. Our announcement: https://t.co/fOa2l0ujwV (CVE-2024-42008, CVE-2024-42009, CVE-2024-42010)
0
3
25
Super excited to present this research at DEF CON! If you think SQL Injections have become a boring and repetitive topic, think again. There's a whole new layer to explore π
SQLi via... binary protocol smuggling?! This upcoming #defcon32 talk from @pspaul95 & @Sonar_Research sounds awesome! https://t.co/wW018bxT6t
4
23
190
Can server-side scanning research be legal and ethical? For our upcoming @IEEESSP paper "Where are the red lines?" we talked to experts on law and ethics, and web operators. We discussed challenges, solutions and various fictional research scenarios. https://t.co/cTjFfiVRRl
4
14
46
Hacklu CTF is running at full steam with still ~23h left! π© We got some great challenges waiting for you, including a 28-year-old 0-day in SSH, a Mastodon n-day, a QEMU escape, and many many more. Come try your luck π±π
0
4
25
Super excited to publish this blog post! One of the most fun bugs I exploited so far, had to get creative and lose my mind reading the CSS spec for 2 days π
Stolen with Style: Dive into our technical writeup of a complex Cross-Site Scripting vulnerability we discovered in Proton Mail! Be ready for a story about parser differentials, sandbox bypasses, and CSS data exfiltration: https://t.co/C6x8OqWXNw
#security #appsec #cleancode
4
15
46
Our paper "Finding All Cross-Site Needles in the DOM Stack - A Comprehensive Methodology for the Automatic XS-Leak Detection in Web Browsers" got accepted at ACM CCS 2023! @acm_ccs The camera-ready version will be available at https://t.co/E7PcJYlJTi. Tool will be on GitHub.
1
2
10
β¨Our paper "Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser" will appear at USENIX Security '23 and is now available as a preprint: https://t.co/rp4DqVmXqV This work is by Matthias Gierlings, me (@lambdafu), and @JoergSchwenk π§΅π
1
6
21
Just for completeness here is my solve script: https://t.co/XyYCi4Mn8z For anyone that wants another challenge try exploit this, with mysql instead of sqlite. π
Helped @justCatTheFish with yet another ctf and solved two highest scored challenges: HTPL from @BitK_ and foodAPI from @kunte_ctf. The former was a JS sandbox escape and the latter was about 0day in #denodb. Some useful tricks π https://t.co/3IqqiupHAi
#hacklu @fluxfingers
0
2
16
Helped @justCatTheFish with yet another ctf and solved two highest scored challenges: HTPL from @BitK_ and foodAPI from @kunte_ctf. The former was a JS sandbox escape and the latter was about 0day in #denodb. Some useful tricks π https://t.co/3IqqiupHAi
#hacklu @fluxfingers
gist.github.com
Hack.lu 2022 CTF solutions. GitHub Gist: instantly share code, notes, and snippets.
1
16
114
The Hacklu 2022 CTF is over! Thank you for playing! Of course special congrats to the top 3 teams! π₯³ π π₯ organizers π₯ justCatTheFish π₯ π¦ CTF: https://t.co/rbPY4FAEo3 Challenges will still be up for a while. See you next Year! #hacklu #ctf @fluxfingers
1
6
47
Less than 24h until Hacklu CTF 2022 and the registration is now open! Sign up at https://t.co/7RrfeQJISn and prepare yourself for the finest hacking. #Hack_lu #CTF
0
9
19
I just published XSLeaker a tool that helps you to find potential #XSLeak vulnerabilities. https://t.co/uG2t10vKQR
github.com
Searcher for cross-site leaks (XS-Leaks). Contribute to Philesiv/XSLeaker development by creating an account on GitHub.
1
51
191
#GoogleCTF is over! This year I prepared a race-condition based challenge which was a combination of #xsleaks #xss and other interesting client-side bugs. The challenge was solved by 10 teams and had unintended solutions, some of which are awesome! π https://t.co/okdH1sHh1c
gist.github.com
Postviewer challenge writeup from GoogleCTF 2022. GitHub Gist: instantly share code, notes, and snippets.
4
57
219
I would like to thank my co-authors @CheariX, @mniemietz, @DominikNo1, @JoergSchwenk and everyone at the NDS Chair. β₯οΈ
1
0
1