Carlos (@00xc1) 's Twitter Profile
Carlos

@00xc1

OSdev, Rust, C, Linux, security and so on.

ID: 1189871766795116546

linkhttps://00xc.pages.dev/ calendar_today31-10-2019 11:48:42

40 Tweet

78 Followers

611 Following

Carlos (@00xc1) 's Twitter Profile Photo

Writeup for "Containers?", from FwordCTF 2021. A journey in Linux namespaces. scavengersecurity.com/posts/fword-co…

fqlenos (@fqlenos) 's Twitter Profile Photo

I’ve recently published my first writeup for “devprivops” bash challenge from #FWordCTF 2021 (by Fword). Thanks to Scavenger Security for their support. scavengersecurity.com/posts/fwordctf…

Carlos (@00xc1) 's Twitter Profile Photo

Writeup for Paas, from GrabCON CTF 2021 (The Cyber Grabs). Format string exploitation in the Linux kernel. scavengersecurity.com/posts/grabcon-…

Scavenger Security (@scavengersec) 's Twitter Profile Photo

Our writeups for ABBR and Beans Talk, from ASIS CTF. We worked with ripp3rs for this CTF, great experience overall! scavengersecurity.com/posts/asisqual… scavengersecurity.com/posts/asisqual…

Carlos (@00xc1) 's Twitter Profile Photo

I wrote a _very_ simple (and hopefully correct) implementation of hazard pointers in pure C89 using GCC atomic builtins: github.com/00xc/libdanger

majek04 (@majek04) 's Twitter Profile Photo

blog.cloudflare.com/how-to-stop-ru… "How to stop running out of ephemeral ports and start to love long-lived connections" Or "Userspace Connectx() on Linux" Or "This is why we need kernel-side connectx()" Or "Why you can have tops 28K outbound UDP connections?" Code github.com/cloudflare/clo…

Open Source Security mailing list (@oss_security) 's Twitter Profile Photo

CVE-2022-24986: KCron: Insecure temporary file handling: Posted by Carlos López on Feb 25Hello list, Find below our report for CVE-2022-24986: Insecure temporary file handling in KDE KCron dlvr.it/SKf5rd

Xeno Kovah (@xenokovah) 's Twitter Profile Photo

🧵1 Kc Udonsi and I wanted to say thanks to the people whose CVE discoveries, vulnerability write-ups, and PoCs we used to create the material for #OST2 ost2.fyi/Vulns1001. So thanks go out to the following contributors…

Jörg Rödel (@joergroedel) 's Twitter Profile Photo

Together with my session at #OC3 today I am excited to share that COCONUT-SVSM is now public! 🔒🌴 Check out the announcement at suse.com/c/suse-open-so… or go directly to the GitHub space github.com/coconut-svsm #ConfidentialComputing

Carlos (@00xc1) 's Twitter Profile Photo

This is the kind of thing that makes you appreciate even more Rust's approach to things. Signed overflow is always well defined: it causes a panic in debug builds and wraps as 2's complement in release builds. Plus `wrapping_add()`, `saturating_add()`, `checked_add()`, etc.

Satoshi Tanda (@standa_t) 's Twitter Profile Photo

Just finished teaching the hypervisor class! Had many good interactions with students and enjoyed it a lot. Hexacon in October is the next opportunity. If you are interested in reading and writing hypervisors, or low-level technologies in general, come to Paris and join us.