- Seokchan Yoon (@ch4n3.yoon)
- Security Researcher & CTF Player ๐ฐ๐ท
- [email protected]
- Security Researcher @ Zellic.io (2025.04. - now)
[REDACTED]
Researcher @[REDACTED]
Research Institute under Ministry of National Defense, Korea (2023.09. - 2025.03.)- Web Security Researcher @ STEALIEN (2020.07. - 2023.06.)
- 2025 DEF CON CTF 33 Finalist (team: Cold Fusion)
- 2024 White Hat Contest Soldier Division
(ํ์ดํธํ ์ฝํ ์คํธ) 1st Place, hosted by the Ministry of National Defense, Korea
Awarded the Minister of National Defense Award (๊ตญ๋ฐฉ๋ถ ์ฅ๊ด์)
- 2023 CODEGATE University Division
Finalist, hosted by the Ministry of Science and ICT, Korea
-
2022 CODEGATE University Division
Finalist, hosted by the Ministry of Science and ICT, Korea -
2022 Cyber Conflict Exercise (CCE) Public Institution Sector Division
(์ฌ์ด๋ฒ๊ณต๊ฒฉ๋ฐฉ์ด๋ํ) 2nd Place, hosted by the National Intelligence Service, Korea
Awarded the Director of National Security Research Institute Award (๊ตญ๊ฐ๋ณด์์ฐ๊ตฌ์์ฅ์) -
2022 HACKTHEON SEJONG National University Cybersecurity Competition
6th Place, hosted by Sejong Special Self-Governing City, Korea
Awarded the Director of National Security Research Institute Award (๊ตญ๊ฐ๋ณด์์ฐ๊ตฌ์์ฅ์)
- 2021 Cyber Conflict Exercise (CCE) Public Institution Sector Division
(์ฌ์ด๋ฒ๊ณต๊ฒฉ๋ฐฉ์ด๋ํ) 2nd Place, hosted by the National Intelligence Service, Korea Awarded the Director of National Security Research Institute Award (๊ตญ๊ฐ๋ณด์์ฐ๊ตฌ์์ฅ์)
- 2019 Cyber Operations Challenge Student Division
(์ฌ์ด๋ฒ์์ ๊ฒฝ์ฐ๋ํ) 2nd Place, hosted by the Ministry of National Defense, Korea
Awarded the Cyber Operations Commander Award (์ฌ์ด๋ฒ์์ ์ฌ๋ น๊ด์)
-
2018 Cybersecurity Competition Individual Preliminary Round
(์ ๋ณด๋ณด์๊ฒฝ์ง๋ํ) 1st Place, hosted by the Ministry of Education, Korea
Awarded the President of Seoul Women's University Award (์์ธ์ฌ์๋ํ๊ต ์ด์ฅ์) -
2018 Cybersecurity Competition Team Finals
(์ ๋ณด๋ณด์๊ฒฝ์ง๋ํ) 1st Place, hosted by the Ministry of Education, Korea
Awarded the Minister of Education Award (๊ต์ก๋ถ ์ฅ๊ด์)
- 2017 Cybersecurity Competition Team Finals
(์ ๋ณด๋ณด์๊ฒฝ์ง๋ํ) 1st Place, hosted by the Korea Education and Research Information Service
Awarded the Director of Korea Education and Research Information Service Award (ํ๊ตญ๊ต์กํ์ ์ ๋ณด์์ฅ์)
- NBB-1126, Stored XSS
- NBB-1143, SQL Injection
- NBB-1260, Stored XSS
- NBB-2315, Reflected XSS
- NBB-2316, Reflected XSS
- NBB-2314, Reflected XSS
- CVE-2024-7592: Quadratic complexity parsing cookies with backslashes
- CVE-2023-36053: Potential regular expression denial of service vulnerability in
EmailValidator
/URLValidator
- CVE-2024-24680: Potential denial-of-service in intcomma template filter
- CVE-2024-27351: Potential regular expression denial-of-service in
django.utils.text.Truncator.words()
- CVE-2024-21520: Cross-Site Scripting (XSS) in browserable API of django-rest-framework
- CVE-2024-41991: Potential denial-of-service vulnerability in
django.utils.html.urlize()
andAdminURLFieldWidget
- CVE-2024-53908 : Potential SQL injection in
HasKey(lhs, rhs)
on Oracle
- CVE-2024-39877: Apache Airflow: DAG Author Code Execution possibility in
airflow-scheduler
- CVE-2024-39863: Apache Airflow: Potential XSS Vulnerability
- CVE-2024-45034: Apache Airflow: Authenticated DAG authors could execute code on scheduler nodes
- CVE-2024-41123: DoS vulnerabilities in REXML
- CVE-2024-47887: Possible ReDoS vulnerability in HTTP Token authentication in Action Controller
- CVE-2024-41128: Possible ReDoS vulnerability in query parameter filtering in Action Dispatch
- CVE-2024-38809: Spring Framework DoS via conditional HTTP request
- KBS <์ฒญ๋ ์ผ์๋ฆฌํ๋ก์ ํธ ์ฌ์ฅ๋์ด ็พ์ณค์ด์> ์ฌ๋ด ์ต์ฐ์ ์ฐ๊ตฌ์์ผ๋ก ์ถ์ฐ
- ์ฌ๋์ธ ๊ธฐ์ ์คํ ๋ฆฌ <์คํธ๋ฆฌ์ธ> ํธ ์ถ์ฐ
- ์ ํ๋ธ โ์ธ์ธ๋ด๋น์โ ์ฑ๋ <์คํธ๋ฆฌ์ธ> ํธ ์ถ์ฐ
- <๋ชจ๋ ์น ์๋น์ค์์์ ๋ฒ๊ทธ์ผ์ด์ค์ ์ํ์ด์ฝ๋ฉ> (@STEALIEN Security Semiar; 3S)
- For English Reader, <Bug Cases and Secure Coding Techniques, in Modern Web Services>
- Related Press Releases (Kor): https://www.boannews.com/media/view.asp?idx=107983&kind=
- Replay: https://www.youtube.com/watch?v=6YgSTZ9i7Vk
- <Django 1-day Vulnerability Analysis> (@HackingCamp 26th ๐ฐ๐ท)
- I analyzed and shared disclosed vulnerabilities with high severity to Django Project, 2022
- Reference: http://hackingcamp.org/
- <Django Framework N-day Vulnerability Analysis & Secure Coding Guide> (@CODEGATE 2023 ๐ฐ๐ท)
- I issued some insecure usages in django with analyzing 1-day vulnerabilities and gave secure coding guide
- Reference: https://codegate.org/sub/conference
- <ํด์ปค์ ๊ด์ ์์ ๋ฐ๋ผ๋ณธ Django Framework> (@PyCon KR 10th)