Skip to content

Commit

Permalink
fixed link, thx eko!
Browse files Browse the repository at this point in the history
  • Loading branch information
0vercl0k committed Aug 31, 2018
1 parent 741bc9c commit a2de94b
Show file tree
Hide file tree
Showing 6 changed files with 6 additions and 6 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -1447,7 +1447,7 @@ <h1 id="wars-over-the-final-words">War's over, the final words</h1>
<p>I guess this is where I thank both <a href="https://twitter.com/elvanderb">@elvanderb</a> for this really cool challenge and <a href="https://twitter.com/synacktiv">@synacktiv</a> for letting him write it :-). <em>Emilien</em> and I also hope you enjoyed the read, feel free to contact any of us if you have any remarks/questions/whatever.</p>
<p>Also, special thanks to <a href="https://twitter.com/__x86">@__x86</a> and <a href="https://twitter.com/jonathansalwan">@jonathansalwan</a> for proofreading!</p>
<p>The codes/traces/tools developed in this post are all available on github <a href="https://github.com/0vercl0k/stuffz/tree/master/NoSuchCon2014">here</a> and <a href="https://github.com/egirault/NoSuchCon2014/tree/master/">here</a>!</p>
<p>By the way, don't hesitate to contact a member of the staff if you have a cool post you would like to see here -- you too can end up in <a href="https://doar-e.github.io/about/">doar-e's wall of fame</a> :-).</p>
<p>By the way, don't hesitate to contact a member of the staff if you have a cool post you would like to see here -- you too can end up in <a href="https://doar-e.github.io/pages/about.html">doar-e's wall of fame</a> :-).</p>
</div><!-- /.entry-content -->
</article>
</section>
Expand Down
2 changes: 1 addition & 1 deletion feeds/all-english.atom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -7894,7 +7894,7 @@ I hope it gave you an understandable example of symbolic execution and what you
&lt;p&gt;I guess this is where I thank both &lt;a href="https://twitter.com/elvanderb"&gt;@elvanderb&lt;/a&gt; for this really cool challenge and &lt;a href="https://twitter.com/synacktiv"&gt;@synacktiv&lt;/a&gt; for letting him write it :-). &lt;em&gt;Emilien&lt;/em&gt; and I also hope you enjoyed the read, feel free to contact any of us if you have any remarks/questions/whatever.&lt;/p&gt;
&lt;p&gt;Also, special thanks to &lt;a href="https://twitter.com/__x86"&gt;@__x86&lt;/a&gt; and &lt;a href="https://twitter.com/jonathansalwan"&gt;@jonathansalwan&lt;/a&gt; for proofreading!&lt;/p&gt;
&lt;p&gt;The codes/traces/tools developed in this post are all available on github &lt;a href="https://github.com/0vercl0k/stuffz/tree/master/NoSuchCon2014"&gt;here&lt;/a&gt; and &lt;a href="https://github.com/egirault/NoSuchCon2014/tree/master/"&gt;here&lt;/a&gt;!&lt;/p&gt;
&lt;p&gt;By the way, don't hesitate to contact a member of the staff if you have a cool post you would like to see here -- you too can end up in &lt;a href="https://doar-e.github.io/about/"&gt;doar-e's wall of fame&lt;/a&gt; :-).&lt;/p&gt;</content><category term="reverse-engineering"></category><category term="z3py"></category><category term="z3"></category><category term="symbolic execution"></category><category term="MIPS"></category><category term="NoSuchCon"></category></entry><entry><title>Dissection of Quarkslab's 2014 security challenge</title><link href="/blog/2014/09/06/dissection-of-quarkslabs-2014-security-challenge/" rel="alternate"></link><published>2014-09-06T20:37:00-07:00</published><updated>2014-09-06T20:37:00-07:00</updated><author><name>Axel "0vercl0k" Souchet</name></author><id>tag:None,2014-09-06:/blog/2014/09/06/dissection-of-quarkslabs-2014-security-challenge/</id><summary type="html">&lt;h1 id="introduction"&gt;Introduction&lt;/h1&gt;
&lt;p&gt;By the way, don't hesitate to contact a member of the staff if you have a cool post you would like to see here -- you too can end up in &lt;a href="https://doar-e.github.io/pages/about.html"&gt;doar-e's wall of fame&lt;/a&gt; :-).&lt;/p&gt;</content><category term="reverse-engineering"></category><category term="z3py"></category><category term="z3"></category><category term="symbolic execution"></category><category term="MIPS"></category><category term="NoSuchCon"></category></entry><entry><title>Dissection of Quarkslab's 2014 security challenge</title><link href="/blog/2014/09/06/dissection-of-quarkslabs-2014-security-challenge/" rel="alternate"></link><published>2014-09-06T20:37:00-07:00</published><updated>2014-09-06T20:37:00-07:00</updated><author><name>Axel "0vercl0k" Souchet</name></author><id>tag:None,2014-09-06:/blog/2014/09/06/dissection-of-quarkslabs-2014-security-challenge/</id><summary type="html">&lt;h1 id="introduction"&gt;Introduction&lt;/h1&gt;
&lt;p&gt;As the blog was a bit silent for quite some time, I figured it would be cool to put together a post ; so here it is folks, dig in!&lt;/p&gt;
&lt;p&gt;The French company &lt;a href="http://blog.quarkslab.com/you-like-python-security-challenge-and-traveling-win-a-free-ticket-to-hitb-kul.html"&gt;Quarkslab&lt;/a&gt; &lt;a href="https://twitter.com/quarkslab/status/507457671386394624"&gt;recently&lt;/a&gt; &lt;a href="https://twitter.com/HITBSecConf/status/507458788522094592"&gt;released&lt;/a&gt; a security challenge to win a free entrance to attend the upcoming &lt;a href="https://conference.hitb.org/hitbsecconf2014kul/"&gt;HITBSecConf&lt;/a&gt; conference in Kuala Lumpur from the 13th of October until the 16th.&lt;/p&gt;
&lt;p&gt;The challenge has been written by &lt;a href="http://blog.quarkslab.com/author/serge-guelton.html"&gt;Serge Guelton&lt;/a&gt;, a R&amp;amp;D engineer specialized in compilers/parallel computations. At the time of writing, already eight different people manage to solve the challenge, and one of the ticket seems to have been won by &lt;code&gt;hackedd&lt;/code&gt;, so congrats to him!&lt;/p&gt;
Expand Down
2 changes: 1 addition & 1 deletion feeds/all.atom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -7894,7 +7894,7 @@ I hope it gave you an understandable example of symbolic execution and what you
&lt;p&gt;I guess this is where I thank both &lt;a href="https://twitter.com/elvanderb"&gt;@elvanderb&lt;/a&gt; for this really cool challenge and &lt;a href="https://twitter.com/synacktiv"&gt;@synacktiv&lt;/a&gt; for letting him write it :-). &lt;em&gt;Emilien&lt;/em&gt; and I also hope you enjoyed the read, feel free to contact any of us if you have any remarks/questions/whatever.&lt;/p&gt;
&lt;p&gt;Also, special thanks to &lt;a href="https://twitter.com/__x86"&gt;@__x86&lt;/a&gt; and &lt;a href="https://twitter.com/jonathansalwan"&gt;@jonathansalwan&lt;/a&gt; for proofreading!&lt;/p&gt;
&lt;p&gt;The codes/traces/tools developed in this post are all available on github &lt;a href="https://github.com/0vercl0k/stuffz/tree/master/NoSuchCon2014"&gt;here&lt;/a&gt; and &lt;a href="https://github.com/egirault/NoSuchCon2014/tree/master/"&gt;here&lt;/a&gt;!&lt;/p&gt;
&lt;p&gt;By the way, don't hesitate to contact a member of the staff if you have a cool post you would like to see here -- you too can end up in &lt;a href="https://doar-e.github.io/about/"&gt;doar-e's wall of fame&lt;/a&gt; :-).&lt;/p&gt;</content><category term="reverse-engineering"></category><category term="z3py"></category><category term="z3"></category><category term="symbolic execution"></category><category term="MIPS"></category><category term="NoSuchCon"></category></entry><entry><title>Dissection of Quarkslab's 2014 security challenge</title><link href="/blog/2014/09/06/dissection-of-quarkslabs-2014-security-challenge/" rel="alternate"></link><published>2014-09-06T20:37:00-07:00</published><updated>2014-09-06T20:37:00-07:00</updated><author><name>Axel "0vercl0k" Souchet</name></author><id>tag:None,2014-09-06:/blog/2014/09/06/dissection-of-quarkslabs-2014-security-challenge/</id><summary type="html">&lt;h1 id="introduction"&gt;Introduction&lt;/h1&gt;
&lt;p&gt;By the way, don't hesitate to contact a member of the staff if you have a cool post you would like to see here -- you too can end up in &lt;a href="https://doar-e.github.io/pages/about.html"&gt;doar-e's wall of fame&lt;/a&gt; :-).&lt;/p&gt;</content><category term="reverse-engineering"></category><category term="z3py"></category><category term="z3"></category><category term="symbolic execution"></category><category term="MIPS"></category><category term="NoSuchCon"></category></entry><entry><title>Dissection of Quarkslab's 2014 security challenge</title><link href="/blog/2014/09/06/dissection-of-quarkslabs-2014-security-challenge/" rel="alternate"></link><published>2014-09-06T20:37:00-07:00</published><updated>2014-09-06T20:37:00-07:00</updated><author><name>Axel "0vercl0k" Souchet</name></author><id>tag:None,2014-09-06:/blog/2014/09/06/dissection-of-quarkslabs-2014-security-challenge/</id><summary type="html">&lt;h1 id="introduction"&gt;Introduction&lt;/h1&gt;
&lt;p&gt;As the blog was a bit silent for quite some time, I figured it would be cool to put together a post ; so here it is folks, dig in!&lt;/p&gt;
&lt;p&gt;The French company &lt;a href="http://blog.quarkslab.com/you-like-python-security-challenge-and-traveling-win-a-free-ticket-to-hitb-kul.html"&gt;Quarkslab&lt;/a&gt; &lt;a href="https://twitter.com/quarkslab/status/507457671386394624"&gt;recently&lt;/a&gt; &lt;a href="https://twitter.com/HITBSecConf/status/507458788522094592"&gt;released&lt;/a&gt; a security challenge to win a free entrance to attend the upcoming &lt;a href="https://conference.hitb.org/hitbsecconf2014kul/"&gt;HITBSecConf&lt;/a&gt; conference in Kuala Lumpur from the 13th of October until the 16th.&lt;/p&gt;
&lt;p&gt;The challenge has been written by &lt;a href="http://blog.quarkslab.com/author/serge-guelton.html"&gt;Serge Guelton&lt;/a&gt;, a R&amp;amp;D engineer specialized in compilers/parallel computations. At the time of writing, already eight different people manage to solve the challenge, and one of the ticket seems to have been won by &lt;code&gt;hackedd&lt;/code&gt;, so congrats to him!&lt;/p&gt;
Expand Down
2 changes: 1 addition & 1 deletion feeds/atom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -7894,7 +7894,7 @@ I hope it gave you an understandable example of symbolic execution and what you
&lt;p&gt;I guess this is where I thank both &lt;a href="https://twitter.com/elvanderb"&gt;@elvanderb&lt;/a&gt; for this really cool challenge and &lt;a href="https://twitter.com/synacktiv"&gt;@synacktiv&lt;/a&gt; for letting him write it :-). &lt;em&gt;Emilien&lt;/em&gt; and I also hope you enjoyed the read, feel free to contact any of us if you have any remarks/questions/whatever.&lt;/p&gt;
&lt;p&gt;Also, special thanks to &lt;a href="https://twitter.com/__x86"&gt;@__x86&lt;/a&gt; and &lt;a href="https://twitter.com/jonathansalwan"&gt;@jonathansalwan&lt;/a&gt; for proofreading!&lt;/p&gt;
&lt;p&gt;The codes/traces/tools developed in this post are all available on github &lt;a href="https://github.com/0vercl0k/stuffz/tree/master/NoSuchCon2014"&gt;here&lt;/a&gt; and &lt;a href="https://github.com/egirault/NoSuchCon2014/tree/master/"&gt;here&lt;/a&gt;!&lt;/p&gt;
&lt;p&gt;By the way, don't hesitate to contact a member of the staff if you have a cool post you would like to see here -- you too can end up in &lt;a href="https://doar-e.github.io/about/"&gt;doar-e's wall of fame&lt;/a&gt; :-).&lt;/p&gt;</content><category term="reverse-engineering"></category><category term="z3py"></category><category term="z3"></category><category term="symbolic execution"></category><category term="MIPS"></category><category term="NoSuchCon"></category></entry><entry><title>Dissection of Quarkslab's 2014 security challenge</title><link href="/blog/2014/09/06/dissection-of-quarkslabs-2014-security-challenge/" rel="alternate"></link><published>2014-09-06T20:37:00-07:00</published><updated>2014-09-06T20:37:00-07:00</updated><author><name>Axel "0vercl0k" Souchet</name></author><id>tag:None,2014-09-06:/blog/2014/09/06/dissection-of-quarkslabs-2014-security-challenge/</id><summary type="html">&lt;h1 id="introduction"&gt;Introduction&lt;/h1&gt;
&lt;p&gt;By the way, don't hesitate to contact a member of the staff if you have a cool post you would like to see here -- you too can end up in &lt;a href="https://doar-e.github.io/pages/about.html"&gt;doar-e's wall of fame&lt;/a&gt; :-).&lt;/p&gt;</content><category term="reverse-engineering"></category><category term="z3py"></category><category term="z3"></category><category term="symbolic execution"></category><category term="MIPS"></category><category term="NoSuchCon"></category></entry><entry><title>Dissection of Quarkslab's 2014 security challenge</title><link href="/blog/2014/09/06/dissection-of-quarkslabs-2014-security-challenge/" rel="alternate"></link><published>2014-09-06T20:37:00-07:00</published><updated>2014-09-06T20:37:00-07:00</updated><author><name>Axel "0vercl0k" Souchet</name></author><id>tag:None,2014-09-06:/blog/2014/09/06/dissection-of-quarkslabs-2014-security-challenge/</id><summary type="html">&lt;h1 id="introduction"&gt;Introduction&lt;/h1&gt;
&lt;p&gt;As the blog was a bit silent for quite some time, I figured it would be cool to put together a post ; so here it is folks, dig in!&lt;/p&gt;
&lt;p&gt;The French company &lt;a href="http://blog.quarkslab.com/you-like-python-security-challenge-and-traveling-win-a-free-ticket-to-hitb-kul.html"&gt;Quarkslab&lt;/a&gt; &lt;a href="https://twitter.com/quarkslab/status/507457671386394624"&gt;recently&lt;/a&gt; &lt;a href="https://twitter.com/HITBSecConf/status/507458788522094592"&gt;released&lt;/a&gt; a security challenge to win a free entrance to attend the upcoming &lt;a href="https://conference.hitb.org/hitbsecconf2014kul/"&gt;HITBSecConf&lt;/a&gt; conference in Kuala Lumpur from the 13th of October until the 16th.&lt;/p&gt;
&lt;p&gt;The challenge has been written by &lt;a href="http://blog.quarkslab.com/author/serge-guelton.html"&gt;Serge Guelton&lt;/a&gt;, a R&amp;amp;D engineer specialized in compilers/parallel computations. At the time of writing, already eight different people manage to solve the challenge, and one of the ticket seems to have been won by &lt;code&gt;hackedd&lt;/code&gt;, so congrats to him!&lt;/p&gt;
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -1323,4 +1323,4 @@ I hope it gave you an understandable example of symbolic execution and what you
&lt;p&gt;I guess this is where I thank both &lt;a href="https://twitter.com/elvanderb"&gt;@elvanderb&lt;/a&gt; for this really cool challenge and &lt;a href="https://twitter.com/synacktiv"&gt;@synacktiv&lt;/a&gt; for letting him write it :-). &lt;em&gt;Emilien&lt;/em&gt; and I also hope you enjoyed the read, feel free to contact any of us if you have any remarks/questions/whatever.&lt;/p&gt;
&lt;p&gt;Also, special thanks to &lt;a href="https://twitter.com/__x86"&gt;@__x86&lt;/a&gt; and &lt;a href="https://twitter.com/jonathansalwan"&gt;@jonathansalwan&lt;/a&gt; for proofreading!&lt;/p&gt;
&lt;p&gt;The codes/traces/tools developed in this post are all available on github &lt;a href="https://github.com/0vercl0k/stuffz/tree/master/NoSuchCon2014"&gt;here&lt;/a&gt; and &lt;a href="https://github.com/egirault/NoSuchCon2014/tree/master/"&gt;here&lt;/a&gt;!&lt;/p&gt;
&lt;p&gt;By the way, don't hesitate to contact a member of the staff if you have a cool post you would like to see here -- you too can end up in &lt;a href="https://doar-e.github.io/about/"&gt;doar-e's wall of fame&lt;/a&gt; :-).&lt;/p&gt;</content><category term="reverse-engineering"></category><category term="z3py"></category><category term="z3"></category><category term="symbolic execution"></category><category term="MIPS"></category><category term="NoSuchCon"></category></entry></feed>
&lt;p&gt;By the way, don't hesitate to contact a member of the staff if you have a cool post you would like to see here -- you too can end up in &lt;a href="https://doar-e.github.io/pages/about.html"&gt;doar-e's wall of fame&lt;/a&gt; :-).&lt;/p&gt;</content><category term="reverse-engineering"></category><category term="z3py"></category><category term="z3"></category><category term="symbolic execution"></category><category term="MIPS"></category><category term="NoSuchCon"></category></entry></feed>
2 changes: 1 addition & 1 deletion feeds/category.reverse-engineering.atom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -3302,7 +3302,7 @@ I hope it gave you an understandable example of symbolic execution and what you
&lt;p&gt;I guess this is where I thank both &lt;a href="https://twitter.com/elvanderb"&gt;@elvanderb&lt;/a&gt; for this really cool challenge and &lt;a href="https://twitter.com/synacktiv"&gt;@synacktiv&lt;/a&gt; for letting him write it :-). &lt;em&gt;Emilien&lt;/em&gt; and I also hope you enjoyed the read, feel free to contact any of us if you have any remarks/questions/whatever.&lt;/p&gt;
&lt;p&gt;Also, special thanks to &lt;a href="https://twitter.com/__x86"&gt;@__x86&lt;/a&gt; and &lt;a href="https://twitter.com/jonathansalwan"&gt;@jonathansalwan&lt;/a&gt; for proofreading!&lt;/p&gt;
&lt;p&gt;The codes/traces/tools developed in this post are all available on github &lt;a href="https://github.com/0vercl0k/stuffz/tree/master/NoSuchCon2014"&gt;here&lt;/a&gt; and &lt;a href="https://github.com/egirault/NoSuchCon2014/tree/master/"&gt;here&lt;/a&gt;!&lt;/p&gt;
&lt;p&gt;By the way, don't hesitate to contact a member of the staff if you have a cool post you would like to see here -- you too can end up in &lt;a href="https://doar-e.github.io/about/"&gt;doar-e's wall of fame&lt;/a&gt; :-).&lt;/p&gt;</content><category term="reverse-engineering"></category><category term="z3py"></category><category term="z3"></category><category term="symbolic execution"></category><category term="MIPS"></category><category term="NoSuchCon"></category></entry><entry><title>Dissection of Quarkslab's 2014 security challenge</title><link href="/blog/2014/09/06/dissection-of-quarkslabs-2014-security-challenge/" rel="alternate"></link><published>2014-09-06T20:37:00-07:00</published><updated>2014-09-06T20:37:00-07:00</updated><author><name>Axel "0vercl0k" Souchet</name></author><id>tag:None,2014-09-06:/blog/2014/09/06/dissection-of-quarkslabs-2014-security-challenge/</id><summary type="html">&lt;h1 id="introduction"&gt;Introduction&lt;/h1&gt;
&lt;p&gt;By the way, don't hesitate to contact a member of the staff if you have a cool post you would like to see here -- you too can end up in &lt;a href="https://doar-e.github.io/pages/about.html"&gt;doar-e's wall of fame&lt;/a&gt; :-).&lt;/p&gt;</content><category term="reverse-engineering"></category><category term="z3py"></category><category term="z3"></category><category term="symbolic execution"></category><category term="MIPS"></category><category term="NoSuchCon"></category></entry><entry><title>Dissection of Quarkslab's 2014 security challenge</title><link href="/blog/2014/09/06/dissection-of-quarkslabs-2014-security-challenge/" rel="alternate"></link><published>2014-09-06T20:37:00-07:00</published><updated>2014-09-06T20:37:00-07:00</updated><author><name>Axel "0vercl0k" Souchet</name></author><id>tag:None,2014-09-06:/blog/2014/09/06/dissection-of-quarkslabs-2014-security-challenge/</id><summary type="html">&lt;h1 id="introduction"&gt;Introduction&lt;/h1&gt;
&lt;p&gt;As the blog was a bit silent for quite some time, I figured it would be cool to put together a post ; so here it is folks, dig in!&lt;/p&gt;
&lt;p&gt;The French company &lt;a href="http://blog.quarkslab.com/you-like-python-security-challenge-and-traveling-win-a-free-ticket-to-hitb-kul.html"&gt;Quarkslab&lt;/a&gt; &lt;a href="https://twitter.com/quarkslab/status/507457671386394624"&gt;recently&lt;/a&gt; &lt;a href="https://twitter.com/HITBSecConf/status/507458788522094592"&gt;released&lt;/a&gt; a security challenge to win a free entrance to attend the upcoming &lt;a href="https://conference.hitb.org/hitbsecconf2014kul/"&gt;HITBSecConf&lt;/a&gt; conference in Kuala Lumpur from the 13th of October until the 16th.&lt;/p&gt;
&lt;p&gt;The challenge has been written by &lt;a href="http://blog.quarkslab.com/author/serge-guelton.html"&gt;Serge Guelton&lt;/a&gt;, a R&amp;amp;D engineer specialized in compilers/parallel computations. At the time of writing, already eight different people manage to solve the challenge, and one of the ticket seems to have been won by &lt;code&gt;hackedd&lt;/code&gt;, so congrats to him!&lt;/p&gt;
Expand Down

0 comments on commit a2de94b

Please sign in to comment.