Mateusz Pstruś (the owner of http://securitytraps.no-ip.org/ - a site with a lot of interesting hackmes/challenges) has informed me that there will be a team Capture the Flag on Security Traps in September.
Some random info
- The official CTF site: http://capturetheflag.securitytraps.2012/ (ekhem, sic; hint: same server as http://securitytraps.no-ip.org/)
- When: 7 September 2012 (be sure to double check the date from time to time)
- Team: max 3 people (need to register + create a team)
- Tasks: 3*PHP/MySQL hackme, 1*JS hackme, 2*Win32 crackme, 1*C++ riddle ('Bonus' whatever that means)
- Rules: 100 points for each completed task at start. If someone solves the task, the points for it get decreased at a rate 1 point per hour. The CTF ends when the points for all tasks get to 0.
- Prizes: Eternal fame I guess - it's a hackers-for-hackers type of event, so there is no money behind it, just fun :)
Anyways, the challenges at ST are usually really unique and non-trivial so I expect it's going to be interesting ;>
P.S. No, I don't know why lately all the hacker tournaments / challenges are called CTF. And no, there will (probably) be no flags (unless we're talking about EFLAGS that is ;p).
Sections
- lang: |
- RSS: |
- About me
- Tools
- → YT YouTube (EN)
- → D Discord
- → M Mastodon
- → T Twitter
- → GH GitHub
Links / Blogs
- → dragonsector.pl
- → vexillium.org
- Security/Hacking:
- Reverse Eng./Low-Level:
- Programming/Code:
Posts
- Two of my bookmarklets: image extraction and simple TTS,
- Paged Out! #3 is out,
- My howto script,
- Talk: PCI Express to Hell,
- Live: On Leaving Google and What's Next,
- Thoughts on overlarge fields in formats and protocols,
- On self-healing code and the obvious issue,
- LLM + Clean Room: Will LLMs be the death of code copyrights?,
- Solving a VM-based CTF challenge without solving it properly,
- Asking MEMORY.DMP and Volatility to make up,
- → see all posts on main page
// copyright © Gynvael Coldwind
// design & art by Xa
// logo font (birdman regular) by utopiafonts / Dale Harris
/* the author and owner of this blog hereby allows anyone to test the security of this blog (on HTTP level only, the server is not mine, so let's leave it alone ;>), and try to break in (including successful breaks) without any consequences of any kind (DoS attacks are an exception here) ... I'll add that I planted in some places funny photos of some kittens, there are 7 of them right now, so have fun looking for them ;> let me know if You find them all, I'll add some congratz message or sth ;> */
Vulns found in blog:
* XSS (pers, user-inter) by ged_
* XSS (non-pers) by Anno & Tracerout
* XSS (pers) by Anno & Tracerout
* Blind SQLI by Sławomir Błażek
* XSS (pers) by Sławomir Błażek
// design & art by Xa
// logo font (birdman regular) by utopiafonts / Dale Harris
/* the author and owner of this blog hereby allows anyone to test the security of this blog (on HTTP level only, the server is not mine, so let's leave it alone ;>), and try to break in (including successful breaks) without any consequences of any kind (DoS attacks are an exception here) ... I'll add that I planted in some places funny photos of some kittens, there are 7 of them right now, so have fun looking for them ;> let me know if You find them all, I'll add some congratz message or sth ;> */
Vulns found in blog:
* XSS (pers, user-inter) by ged_
* XSS (non-pers) by Anno & Tracerout
* XSS (pers) by Anno & Tracerout
* Blind SQLI by Sławomir Błażek
* XSS (pers) by Sławomir Błażek
Add a comment: