Sihoon Lee Profile
Sihoon Lee

@push0ebp

Followers
417
Following
156
Media
17
Statuses
209

Web3 Security Researcher / ex-reverser / prev. @kalos_security, @theori_io

대한민국 서울
Joined November 2018
Don't wanna be here? Send us removal request.
@push0ebp
Sihoon Lee
3 months
GG with talented hackers.
@SuperGuesser
Super Guesser
3 months
We got 2nd place in the prequal of DEFCON CTF! We have collaborated with @dicegangctf and CodeRed 👏
Tweet media one
0
0
8
@push0ebp
Sihoon Lee
5 months
RT @Web3Kimchi: 🎉The KimchiPremium took 3rd place at Remedy 2025! 🎉 We're a Korean CTF team that plays for fun. Many thanks to the @xyz_rem….
0
9
0
@push0ebp
Sihoon Lee
5 months
Happy to have learned good lessons and excited to have tried @xyz_remedy 's Glider, which is a code query tool I’ve been wanting to explore for some time. I'm looking forward to trying for real hunting.
0
1
10
@push0ebp
Sihoon Lee
5 months
Good game with 3rd place and managed to solve an only 3-solved challenge. Thanks to @xyz_remedy @hexensio and all the authors for hosting the biggest Web3 CTF and creating such great challenges.
@xyz_remedy
Remedy
5 months
The biggest Web3 CTF is over:. 🥇 @ChainLight_io.🥈 A-Team.🥉 @Web3Kimchi. The Remedy CTF 2025 was @hexensio's first-ever competition. Check out all the highlights 🧵
Tweet media one
2
2
20
@push0ebp
Sihoon Lee
5 months
My first X Space was good experience. Thank you for inviting me as a member from @Web3Kimchi.
@xyz_remedy
Remedy
5 months
If you’re into web3 security, this one’s a must-watch:. Tune into the X Spaces tomorrow, Jan 22 at 4PM CET, where @0xkasper will be grilling the co-hosts on all things CTF. Legendary lineup: @ma1fan, @Jhoe0x, @merkle_bonsai, @k3mmio, @rileyholterhus, @tpiliposian,
0
0
5
@push0ebp
Sihoon Lee
6 months
Oh, I found who did. It's outstanding work.
0
0
1
@push0ebp
Sihoon Lee
6 months
I was impressed by this great work by the white-hat!.I'm still wondering it's automatic or manual hack. I can't believe it's analyzed right after vulnerable contract was deployed. Please DM me if you worked on this!.
1
0
0
@push0ebp
Sihoon Lee
6 months
The white-hat acted during the hacker's ongoing token theft. While the hacker was stealing some tokens across separated transactions, the white-hat intercepted the last USDC. This was an incredible recovery effort, analyzing and recovery within 10 minutes.
1
0
0
@push0ebp
Sihoon Lee
6 months
While I was asleep, the hacker mistakenly upgraded to a vulnerable contract without access controls. SEAL's white-hat detected this, quickly upgraded the hacked contract, and successfully got control back. This allowed them to recover the remaining USDC.
1
0
0
@push0ebp
Sihoon Lee
6 months
I was asked by my friend to analyze this hack last night. After analyzing the hacker's contract, I concluded that all functions had access controls applied, leaving no way to recover the funds. I suggested contacting SEAL 911.
@BeosinAlert
Beosin Alert
6 months
It is suspected that the private key of @Moby_trade has been leaked,,the hacker modified the implementation contract and exploited the emergencyWithdrawERC20 function to extract 207 ETH, 3.7 BTC, and 1,470,191 USDC, totaling approximately $2.5M.
2
0
3
@push0ebp
Sihoon Lee
6 months
This is incorrect. The 1.4m USDC was recovered by white hat.
@BeosinAlert
Beosin Alert
6 months
It is suspected that the private key of @Moby_trade has been leaked,,the hacker modified the implementation contract and exploited the emergencyWithdrawERC20 function to extract 207 ETH, 3.7 BTC, and 1,470,191 USDC, totaling approximately $2.5M.
0
0
0
@push0ebp
Sihoon Lee
6 months
Well-written article. These days, TEE (Trusted Execution Environment) frequently comes up in Web3. When I was conducting research in traditional system security, I often saw TEE discussed in academia. It is interesting to see this technology now being applied in Web3.
@ChainLight_io
ChainLight
6 months
Are you bullish in web3 projects utilizing TEEs? If so, do you really know what TEE is and how they work?. Today, we are publicly releasing our internal report on projects utilizing TEEs. Currently, various projects, especially AI agents, that promotes to leverage Trusted
Tweet media one
1
0
4
@push0ebp
Sihoon Lee
7 months
Investigators,.Please don't misunderstand me as an exploiter.
Tweet media one
0
0
7
@push0ebp
Sihoon Lee
8 months
The final was a typical attack and defense style like DEFCON, but competing with teams from different continents was a unique experience. It's an unforgettable experience. Thanks for all your hard work and I look forward to seeing you again at another CTF.
0
0
0
@push0ebp
Sihoon Lee
8 months
I recently participated in the ICC CTF Finals #ic3games in Chile as Team Asia. I managed to get 1st place in the ACSC CTF Reversing category and qualified as a reverse engineer for the ICC Finals. I was happy to meet and connect with super hackers from across Asia.
@acsc_asia
Asian Cyber Security Challenge (ACSC)
8 months
Team Asia secured 2nd place at the ICC 2024 Chile regional team CTF!. 1st: Team Europe.2nd: Team Asia.3rd: Team Oceania. Congratulations for Team Asia, and Big thanks to @trabodalabs for their dedicated challenge creation!. #acsc #icc #ic3games #ctf #TeamAsia #cybersecurity.
1
0
4
@push0ebp
Sihoon Lee
9 months
Thank you for this fun challenge! @fuzzland_ .#BlazCTF.
0
0
0
@push0ebp
Sihoon Lee
9 months
Fun Fact.I forgot to pass the `--balance 100000000000` argument for anvil, which would have simplified the exploit by allowing control over the pointer with `maxPriorityFeePerGas`. This oversight led to a more complicated approach during the CTF. I was stupid lol.
1
0
0
@push0ebp
Sihoon Lee
9 months
7. Conclusion.The bug was rooted in a build configuration mismatch between the JIT executor and compiler, leading to type confusion. This was impressive compared to typical JIT bugs, which are usually related to optimization errors.
1
0
0
@push0ebp
Sihoon Lee
9 months
6. Exploitation.This allows them to set up arbitrary address read and leak the flag. We can control the memory addresses with `priority-gas-price` in cast CLI to extract the flag.
1
0
0
@push0ebp
Sihoon Lee
9 months
For example, in the JIT code, `blobhashes_ptr` pointed to the `maxPriorityFeePerGas` field instead of the actual blobhashes pointer, allowing an attacker to control `blobhashes_ptr` and `blobhash_len` and trigger an arbitrary address read to leak the flag.
Tweet media one
1
0
0