lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 10 Feb 2010 01:03:03 +0800
From: Hafez Kamal <aphesz@...kinthebox.org>
To: funsec@...uxbox.org, full-disclosure@...ts.grok.org.uk,
	isn@...osecnews.org, pen-test@...urityfocus.com,
	security-basics@...urityfocus.com, bugtraq@...urityfocus.com,
	webappsec@...urityfocus.com, focus-ids@...urityfocus.com,
	honeypots@...urityfocus.com, crypto@...urityfocus.com,
	phishing@...urityfocus.com, focus-apple@...urityfocus.com,
	realcases@...urityfocus.com, binaryanalysis@...urityfocus.com,
	forensics@...urityfocus.com, linux-secnews@...urityfocus.com,
	psrc@...urityfocus.com, securityjobs-discussion@...urityfocus.com,
	incidents@...urityfocus.com, focus-virus@...urityfocus.com,
	wifisec@...urityfocus.com, firewalls@...urityfocus.com,
	loganalysis@...urityfocus.com, dailydave@...ts.immunitysec.org,
	Majordomo@...cert.gov, websecurity@...appsec.org,
	debian-security@...t.debian.org, email@...r.org.uk,
	oss-security@...ts.openwall.com, security-announce@...ts.apple.com,
	html-list@...uriteam.com, framework@...ol.metasploit.com,
	wireshark-users@...eshark.org, snort-users@...ts.sourceforge.net,
	snort-devel@...ts.sourceforge.net, nsp-security@...k.nether.net,
	scadasec@...s.infracritical.com,
	rkhunter-users@...ts.sourceforge.net,
	gentoo-security@...ts.gentoo.org, kernel-discuss@...drivalinux.org,
	web-qa@...drivalinux.org, mysql-plain-digest@...ts.mysql.com,
	nepcert-list@...cert.org.np, pgsql-hacker@...tgresql.org,
	dev-tech-crypto@...ts.mozilla.org,
	dev-platforms-mobile@...ts.mozilla.org,
	dev-security@...ts.mozilla.org
Subject: #HITB - Special Report: HITB2009 CTF Weapons of Mass Destruction

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

A true 'hacker's conference' wouldn't be fun without a competition
where hackers go head to head, tears are shed, and blood is spilled,
and when we say blood we mean points. CTFs have always been about how
good and fast you are at reversing and exploiting daemons and
binaries. Sure it's fun and all but after a few years of the same
thing, it's starts to get boring. Hence we decided to come up with CTF
- - Weapons of Mass Destruction (say it with me, destruktion!!!).

Let's face it, acquiring allies and launching nukes at rival teams is
much more fun than just reversing binaries and stealing flags.
Strategy is everything! The crew worked hard through out the year,
planning the game mechanics, designing the world map, and coming up
with complex challenges for the game. Though there were some quirks
here and there on game day, miraculously we pulled it off. The nukes
weren't the only thing that was different. We also had no prize money
for this year's CTF but teams still signed up anyway purely for the
bragging rights. You guys are f@...ing awesome!

So without further ado, the CTF crew brings you the writeup for
Weapons of Mass Destruction 2009. Enjoy!

https://www.hackinthebox.org/misc/HITB-CTF2009-Special-Report.pdf
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.11 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAktxlUQACgkQbMY1K865PtGXeACfdD2kYtSaPi8xjC4v8a4mLp/S
jYIAoLbNRbXUQpBBZhobgPO6QoF8CkWn
=yeuM
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ