GhostCcamm (@ghostccamm) 's Twitter Profile
GhostCcamm

@ghostccamm

I have a crippling addiction hacking websites
Sometimes participate in CTFs with @EmuExploit

ID: 1247089867411996672

linkhttps://www.ghostccamm.com/ calendar_today06-04-2020 09:13:02

68 Tweet

422 Followers

183 Following

DownUnderCTF (@downunderctf) 's Twitter Profile Photo

Behold! From the depths of darkness 😈, an insidious bug has emerged, ensnaring our beloved flightless birds in its vile grip! Join us from the 5th to the 7th of July and heed the call to rescue our feathered friends! Register now at play.duc.tf!

Vie (@vie_pls) 's Twitter Profile Photo

This weekend I played in DUCTF! I solved the hardest web challenge with a teammate. The writeup is here. TL;DR - tsconfig.json isn’t actually json jamvie.net/posts/2024/07/… Thank you to the organizers, especially for kicking me out of hibernation of my blog!

GhostCcamm (@ghostccamm) 's Twitter Profile Photo

Thanks to everyone participating in DownUnderCTF 5! MC Fat Monke will be back again next year with hopefully a working headset youtube.com/watch?v=jmhn3I… (I might post some things on that channel at a later date)

GhostCcamm (@ghostccamm) 's Twitter Profile Photo

Part 2 of our ORM Leak research about attacking insecure uses of the Prisma ORM. We also do a deep dive into a methodology for constructing time-based attack for ORMs, using Prisma as an example and released a tool called plormber to assist with exploitation.

Cybears (@cybearsctf) 's Twitter Profile Photo

Cybears are getting ready to again awkwardly combine with the official BSides CBR theming! Join us on an epic quest to combine transformers, bears and LOTR into a fun CTF 🤣🤖🐻🏹⚔️ BSidesCanberra

Kylie McDevitt (@kylieengineer) 's Twitter Profile Photo

Congrats ⁦toasterpwn⁩ winning the #Hexacon2024 CTF speed run yesterday. Great work by the ⁦Hexacon⁩ team in organising it - it was great fun to watch!

Congrats ⁦<a href="/toasterpwn/">toasterpwn</a>⁩ winning the #Hexacon2024 CTF speed run yesterday. Great work by the ⁦<a href="/hexacon_fr/">Hexacon</a>⁩ team in organising it - it was great fun to watch!
elttam (@elttam) 's Twitter Profile Photo

New blog post: New Method to Leverage Unsafe Reflection and Deserialisation and gain RCE on Rails elttam.com/blog/rails-sql…

DownUnderCTF (@downunderctf) 's Twitter Profile Photo

🔥 2025, we’re coming in HOT! 🔥 Block out July 18th-20th - it’s going to be an absolute explosion of fun! 🎉🚀 #CTF #DownUnderCTF

🔥 2025, we’re coming in HOT! 🔥 Block out July 18th-20th - it’s going to be an absolute explosion of fun! 🎉🚀
#CTF #DownUnderCTF
DownUnderCTF (@downunderctf) 's Twitter Profile Photo

Did you guess right? ONE month until DownUnderCTF 2025 kicks off and by now you should know what you’ll be doing this 18-20th July! Join us! Share your interest here! ctftime.org/event/2669

xEHLE (@xehle_) 's Twitter Profile Photo

New writeup: Early last month, Sam Curry, sshell, and I found a Django ORM injection in an online shooter game that let us steal cryptocurrency from the game's wallet. Read the blog post here: blog.p1.gs/writeup/2025/0…

GhostCcamm (@ghostccamm) 's Twitter Profile Photo

i will be dropping my fattest track at 7:30pm this friday this song will straight up give you cholesterol register to DownUnderCTF now! 2025.duc.tf

Assetnote (@assetnote) 's Twitter Profile Photo

Sometimes, SQL injection is still possible, even when prepared statements are being used. Our researcher hashkitten has written up a blog post about a novel technique for SQL Injection in PDO’s prepared statements: slcyber.io/assetnote-secu…

GhostCcamm (@ghostccamm) 's Twitter Profile Photo

I will be presenting my research into ORMs at Black Hat EU this year! In my talk I showcase that an ORM could leak more data than what you joined for and methods on how to exploit a vulnerable use case, without exploiting an SQLi. #BHEU Black Hat blackhat.com/eu-25/briefing…

GhostCcamm (@ghostccamm) 's Twitter Profile Photo

We've published a new advisory regarding a circumstantial authentication bypass for the Beego framework. This vulnerability was reported in May, and after multiple follow-ups with no response, we have made the advisory public. github.com/elttam/publica…