1.7K Followers
392 Following
2K Posts

New #security #blog post on #SkullSecurity by @iagox86: BSidesSF 2026: rugdoctor - a broken JIT compiler pwn challenge

https://www.skullsecurity.org/2026/bsidessf-2026-rugdoctor-a-broken-jit-compiler-pwn-challenge

(Replies here will show up on the blog post)

#bsidessf2026 #bsidessf #ctfs #pwn #JIT

BSidesSF 2026: rugdoctor - a broken JIT compiler pwn challenge

This is a write-up for rugdoctor, which is a JIT compiler with a 16-bit integer overflow. The integer overflow allows you to jump to the middle of other instructions, to run small bits of code in between other instructions. As always, you can find copies of the binaries, containers, and full solution in our GitHub repo!

SkullSecurity Blog

New #security #blog post on #SkullSecurity by @iagox86: BSidesSF 2026: read(write(call))me - progressive pwn challenges

https://www.skullsecurity.org/2026/bsidessf-2026-read-write-call-me-progressive-pwn-challenges

(Replies here will show up on the blog post)

#bsidessf2026 #bsidessf #ctfs #pwn

BSidesSF 2026: read(write(call))me - progressive pwn challenges

This is a write-up for three “pwn” challenges - readwritecallme, readwriteme, readme. They’re all pretty straight forward, and designed to teach a specific exploit type: how to exploit an arbitrary memory write. All three challenges let you read arbitrary memory, and the first two additionally let you write to arbitrary memory. The final one (readme) only lets you read memory, but it has a buffer overflow that lets you take control. Technically, all three can be solved with the readme solution, but I’ll go over my intended solutions for all three, since I think it’s helpful. As always, you can find copies of the binaries, containers, and full solution in our GitHub repo!

SkullSecurity Blog

New #security #blog post on #SkullSecurity by @iagox86: BSidesSF 2026: nameme - a DNS-based pwn challenge

https://www.skullsecurity.org/2026/bsidessf-2026-nameme-a-dns-based-pwn-challenge

(Replies here will show up on the blog post)

#bsidessf2026 #bsidessf #ctfs #pwn #dns

BSidesSF 2026: nameme - a DNS-based pwn challenge

This is a challenge I’ve been considering making forever. It’s possible I’ve already made it, even, it’s one of those things that appeals to my brain! As always, you can find copies of the binaries, containers, and full solution in our GitHub repo!

SkullSecurity Blog

New #security #blog post on #SkullSecurity by @iagox86: BSidesSF 2026: miscellaneous challenges (if-it-leads, gitfab, jengacrypt), filed under #bsidessf-2026, #bsidessf, #ctfs, #misc

https://www.skullsecurity.org/2026/bsidessf-2026-miscellaneous-challenges-if-it-leads-gitfab-jengacrypt-

(Replies here will show up on the blog post)

BSidesSF 2026: miscellaneous challenges (if-it-leads, gitfab, jengacrypt)

This will be a write-up for the three shorter / more miscellaneous challenges I wrote: if-it-leads gitfab jengacrypt As always, you can find copies of the binaries, containers, and full solution in our GitHub repo!

SkullSecurity Blog
A 32-Year-Old Bug Walks Into A Telnet Server (GNU inetutils Telnetd CVE-2026-32746)

A long, long time ago, in a land free of binary exploit mitigations, when Unix still roamed the Earth, there lived a pre-authentication Telnetd vulnerability. In fact, this vulnerability was born so long ago (way back in 1994) that it may even be older than you. To put the timespan

watchTowr Labs

RE: https://infosec.exchange/@runZeroInc/116267641061407900

They also have a cool caesar cipher challenge!

NorthSec 2026 speaker lineup is here ...and it's our best yet!

31 talks & workshops. Two days in Montréal. Tickets going fast (get yours by April 1st to secure a badge and a t-shirts). 👇

𝗧𝗮𝗹𝗸𝘀:
• Guillaume Valadon & Gaetan — Private Key Leaks in the Wild: Insights from Certificate Transparency
• Philippe Pépos Petitclerc — A systematic approach to evading antivirus software
• Émilio Gonzalez — Increasing detection engineering maturity with detection as code
• François Labrèche — A Needle in a Haystack: Identifying an Infostealer Attack Through Trillions of Events in a Large-scale Modern SOC
• Wietze — Trust me, I'm a Shortcut - new LNK abuse methods
• Reza Sharifi — Internet Blackout 2026 in Iran — Next-Level Internet Censorship: A Technical Breakdown of Techniques and Tactics
• Andrew Buchanan, Max CM & Connor Laidlaw — Commit, Push, Compromise: Attacking Modern GitHub Orgs
• Dirk-jan Mollema & Sanne Maasakkers — Researchers vs. Threat Actors in Cloud Attacks
• Jeremy Miller — Measuring AI Ability to Complete Long Cybersecurity Tasks
• Manu Jose — The Merchant of Venice: Trading Latency for Security at Scale
• Joshua Prager & Ben Schroeder — Mapping Deception Solutions with BloodHound OpenGraph
• Christian Paquin — Doxxing-proof authentic digital media: trust the asset, protect the source
• Robbe Van Roey — Hacking Browsers: The Easy Way
• Ron Bowes — Adventures in Process Injection (How I Accidentally Built a Debugger - Again!)
• Xavier Facélina — Le futur s'invente avant-hier
• Charl-Alexandre Le Brun & Simon Lachkar — The OpenGraph diary: Attack path management applied to Ansible
• François Proulx — Living Off The Pipeline: Defensive Research, Weaponized
• Pierre-Nicolas Allard-Coutu — Stolen Laptops: Defeating DMA Countermeasures
• Philippe Marchand — Cybermenaces géopolitiques au Canada: État des lieux et perspectives stratégiques
• Kristine Barbara — From Experts to Everyone: Democratizing Threat Modeling at Ubisoft
• Chirag Savla — When Serverless Becomes a Foothold: Abusing Azure Function Apps in Modern Cloud Environments
• Brad Edwards — APTL: An Open Source Agentic Purple Team Lab
• Maxime Arquilliere & Coline C — Sold to the highest bidder: the escalation of ADINT from geolocation tracking to intrusion vector
• Sébastien Dudek — Hacking 5G: From Radio Security to the APIs

𝗪𝗼𝗿𝗸𝘀𝗵𝗼𝗽𝘀:
• Logan Maclaren & Lewis Moore — Command & Conquer: A hands-on C2 primer for aspiring Red & Blue teamers
• Santiago Abastante — AWS Security - The Purple Team Way
• Faan Rossouw — Agentic AI for Threat Hunting
• Ben Gardiner — Hardware RE: a gentle intro
• Tammy Harper — The Ransomware Negotiation Lab
• Mark El-Khoury — DIY Continuous Security: Practical Security Engineering
• Ashley Manraj & Philippe Dugré (zer0x64) — Breaking and Hardening the Cloud: Advanced Hooking and Shellcoding in a Hardened Environment

#NorthSec #cfp #infosec #cybersecurity

8 Million Requests Later, We Made The SolarWinds Supply Chain Attack Look Amateur

Surprise surprise, we've done it again. We've demonstrated an ability to compromise significantly sensitive networks, including governments, militaries, space agencies, cyber security companies, supply chains, software development systems and environments, and more. “Ugh, won’t they just stick to creating poor-quality memes?” we hear you moan. Maybe we should, maybe

watchTowr Labs

I'm so proud of the @BSidesSFCTF team - 10 years (11 challenges) later and they're all still killing it with a huge variety of cool challenges of all difficulty levels!

#ctf #bsidessf

Federal Cyber Experts Thought Microsoft’s Cloud Was “a Pile of Shit.” They Approved It Anyway.

A federal program created to protect the government against cyber threats authorized a sprawling Microsoft cloud product, despite the company’s inability to fully explain how it protects sensitive data.

ProPublica