Pewnie kojarzycie moją ulubioną konferencje security w .pl - CONFidence? Wygląda na to, że znajomy na swoim serwisie zorganizował bardzo ciekawy konkurs (trzeba stworzyć fajne CrackMe) w którym można wygrać wejściówkę na wcześniej wspomnianą konferencję.
Więcej info o konkursie:
https://www.secnews.pl/2011/04/28/konkurs-pimp-my-crackme/
Więcej info o konferencji:
http://2011.confidence.org.pl/
(zachęcam też do poszperania za hasłem "CONFidence" na moim blogu)
glhf!
P.S. Niestety ja na tej edycji CONFidence się nie pojawię... a szkoda :( Ale mam nadzieję, że uda mi się na jesiennej edycji (jeśli będzie) zjawić.

Sections
- lang:
|
- RSS:
|
- About me
- Tools
- → YT YouTube (EN)
- → D Discord
- → M Mastodon
- → T Twitter
- → GH GitHub
Links / Blogs
- → dragonsector.pl
- → vexillium.org
- Security/Hacking:
- Reverse Eng./Low-Level:
- Programming/Code:
Posts
- KnightCTF 2023 write-ups (RE category),
- Dev Log: Moving contacts from Android to MaxCom MM721,
- Weird PCI-e connector actually works,
- A clever Python challenge – find flag,
- Debug Log: The mystery of usb 3-11 device,
- Hello World under the microscope,
- Crow HTTP framework use-after-free,
- Crowbleed (Crow HTTP framework vulnerability),
- Treebox - Python AST sandbox challenge from Google CTF 2022,
- An informal review of CTF abuse,
- → see all posts on main page
// copyright © Gynvael Coldwind
// design & art by Xa
// logo font (birdman regular) by utopiafonts / Dale Harris
/* the author and owner of this blog hereby allows anyone to test the security of this blog (on HTTP level only, the server is not mine, so let's leave it alone ;>), and try to break in (including successful breaks) without any consequences of any kind (DoS attacks are an exception here) ... I'll add that I planted in some places funny photos of some kittens, there are 7 of them right now, so have fun looking for them ;> let me know if You find them all, I'll add some congratz message or sth ;> */
Vulns found in blog:
* XSS (pers, user-inter) by ged_
* XSS (non-pers) by Anno & Tracerout
* XSS (pers) by Anno & Tracerout
* Blind SQLI by Sławomir Błażek
* XSS (pers) by Sławomir Błażek
// design & art by Xa
// logo font (birdman regular) by utopiafonts / Dale Harris
/* the author and owner of this blog hereby allows anyone to test the security of this blog (on HTTP level only, the server is not mine, so let's leave it alone ;>), and try to break in (including successful breaks) without any consequences of any kind (DoS attacks are an exception here) ... I'll add that I planted in some places funny photos of some kittens, there are 7 of them right now, so have fun looking for them ;> let me know if You find them all, I'll add some congratz message or sth ;> */
Vulns found in blog:
* XSS (pers, user-inter) by ged_
* XSS (non-pers) by Anno & Tracerout
* XSS (pers) by Anno & Tracerout
* Blind SQLI by Sławomir Błażek
* XSS (pers) by Sławomir Błażek
Comments:
Add a comment: