Hacking Contests

/Hacking Contests

Week 37 in Review – 2009

Events Related: Diutinus Defense Technologies Corp. - ddtek.biz The site of the team managing the DEFCON CTF games. SecureTubeCon - securitytubecon.org This conference will be held completely online! Tools: Aircrack-ng v1.0 - aircrack-ng.org Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. Bsqlbf [...]

Week 35 in Review – 2009

Events Related: T2'09 Challenge - f-secure.com Solve the puzzle and win; you can win with Speed or Style. Tools: Dranzer v1.9.1 - sourceforge.net/projects/dranzer/ CERT developed this open source tool so that software developers can test ActiveX controls for vulnerabilities. Techniques: Web Application Scanning Using Nessus Video - tenablesecurity.com Scanning web applications with Nessus offers the [...]

2017-03-12T17:40:19-07:00 September 7th, 2009|Hacking Contests, Security Tools, Vendor News|0 Comments

Week 33 in Review – 2009

Events Related: Black Hat USA 2009 Media Archives - blackhat.com A compilation of the white papers, presentations and other media from this security conference. Next Baysec: Aug 18 at Kate O’Briens - root.org Another Bay Area event coming soon DEFCON Related posts PaulDotCom Defcon Party Challenge: The Solution - pauldotcom.com Now that DEFCON 17 is [...]

Week 32 in Review

Events Related: DEFCON posts Defcon: What to leave at home and other do's and don'ts - cnet.com Hacking the DefCon 17 Badges - wired.com DefCon 17 Mystery Challenge - wired.com Inside the World’s Most Hostile Network - wired.com Social Zombies Slides and DEFCON Updates - spylogic.net The Dark Cough – DEFCON 17 - thedarkvisitor.com Flickr [...]

Integrated Cyber Exercise II Carnival

Last week was the Integrated Cyber Exercise (ICE) ran by White Wolf Security. The game consisted of three teams that either attack (Red Cell), defend (Blue Cell), or observe. The Blue Cell were responsible for keeping their network alive and functional, and the Red Cell were responsible for attacking the Blue Cell network. Here are [...]

2008-10-08T20:16:00-07:00 October 8th, 2008|Hacking Contests|0 Comments

Several Information Security Competitions During Cyber Security Awareness Week

The ISIS Lab of NYU-Poly is having their annual Cyber Security Awareness Week (CSAW) where students can compete and win prizes in a variety of information security challenges. There are seven information security competitions: Security Quiz, Application Security CTF, Forensics Challenge, Essay Contest, Awareness Poster Design Competition, Embedded System Challenge, and Research Post Competition. All [...]

2008-09-04T16:29:59-07:00 September 4th, 2008|Hacking Contests|0 Comments

CanSecWest: Day 2 Recap

Most Informative Talk: Intelguardians' cold memory forensics workshop. They leveraged the Princeton/Wind River/EFF research paper, and created two tools to extract passwords from a memory dump. The tools weren't released at the conference, but they promise that it will be available soon. Two people from the original research (Jacob Appelbaum and William Paul) was also [...]

2017-03-12T17:40:28-07:00 March 27th, 2008|Hacking Contests, Security Conferences|1 Comment

CanSecWest: Day 1 Recap

Most Informative Talk: Oded Horovitz's talk on VMware. He showed off some upcoming features of the product, like VMSafe, security APIs, and session replay. With VMSafe and the security APIs, you will be able to run code inside the hypervisor! In one demo, he showed how VMSafe can detect malware that was modified to bypass [...]

2017-03-12T17:40:28-07:00 March 26th, 2008|Hacking Contests, Security Conferences|0 Comments

CanSecWest: PWN to OWN Contest

CanSecWest is just around the corner, and TippingPoint just announced some additional incentives to the PWN to OWN contest. Like last year, TippingPoint is giving cash prizes away, but this year they are giving away at least $20,000! For those that aren't familiar with the contest, several machines are setup, with the latest OS patches [...]

2017-03-12T17:40:29-07:00 March 21st, 2008|Hacking Contests, Security Conferences|0 Comments