Forwarded from PHDays CTF 2017
Hey guys! We are Hackerdom team, developers of the PHDays CTF 2017. It will be classic attack-defense CTF. Registration to the CTF will be closed tomorrow, May, 11 at 16:00 UTC. If you are not registered yet, hurry up: https://ctf.phdays.com/
CTF will start May, 12 at 16:00 UTC. First hour — for initial setup as usual. Network segments will be open from 17:00 UTC to 01:00 UTC (May, 13).
Enjoy!
CTF will start May, 12 at 16:00 UTC. First hour — for initial setup as usual. Network segments will be open from 17:00 UTC to 01:00 UTC (May, 13).
Enjoy!
Forwarded from RuCTFE [DEPRECATED]
Looking forward to seeing you at #RuCTFE 2017 on December 2nd! https://ructfe.org/
ructfe.org
RuCTFE 2020 > INDEX
RuCTFE is an annual online international challenge in information security. It has been held 11 times already.
Forwarded from RuCTFE [DEPRECATED]
Registration is opened. You're welcome to join our ship!
Remind you, RuCTFE 2017 will be held on December 2nd.
https://ructfe.org/registration
#RuCTFE
Remind you, RuCTFE 2017 will be held on December 2nd.
https://ructfe.org/registration
#RuCTFE
ructfe.org
RuCTFE 2020 > REGISTRATION
RuCTFE is an annual online international challenge in information security. It has been held 11 times already.
Forwarded from RuCTFE [DEPRECATED]
Task from us is already available at hackquest.zeronights.org!
You can win tickets to ZeroNights conference if you will be the first person who solve it
You can win tickets to ZeroNights conference if you will be the first person who solve it
Forwarded from RuCTFE [DEPRECATED]
RuCTFE is going to start in less than two weeks, and we are ready to present something new to you. We hope you'll like it :) Here it is, RuCTFE Cloud!
https://telegra.ph/RuCTFE-Cloud-2017-11-20
https://telegra.ph/RuCTFE-Cloud-2017-11-20
Telegraph
RuCTFE Cloud 2017
Q: What is RuCTFE Cloud? A: Before now all RuCTFE participants had to deploy vulnerable image on their own servers and PCs. This year we thought that for some teams it might actually be a problem. That is why now you can deploy the image on our servers! No…
Forwarded from RuCTFE [DEPRECATED]
Less than twenty-four hours is left until we start, have time to prepare! Bonus: instruction to alternative flag submission system.
https://ructfe.org/news/#twenty-four-hours
https://ructfe.org/news/#twenty-four-hours
ructfe.org
RuCTFE 2019 > NEWS
RuCTFE is an annual online international challenge in information security. It has been held 10 times already.
Forwarded from RuCTFE [DEPRECATED]
Registration is closed! Today 358 teams will play #RuCTFE 2017! https://ructfe.org/news/#today
ructfe.org
RuCTFE 2019 > NEWS
RuCTFE is an annual online international challenge in information security. It has been held 10 times already.
RuCTF 2018 is going to take part in Yekaterinburg on April 12-16.
RuCTF is an annual open all-Russian intercollegiate competition and conference on information protection. This year we are holding the contest for the 12th time!
The schedule will be the following:
April 12 — it's better to arrive on this day as the conference is going to start on April 13 since morning (we promise, this day will not seem boring to you),
April 13-14 — the conference itself and a personal contest on information security,
April 15 — RuCTF 2018 final contest,
April 16 — awarding and closing ceremony.
We have already sent all the invitations to the teams and very soon the list of invited teams will be made public. The conference program will be published a little later, but it already promises to be useful and fascinating :)
Official website: https://ructf.org/2018/en
You can ask any questions via our email: [email protected]
RuCTF is an annual open all-Russian intercollegiate competition and conference on information protection. This year we are holding the contest for the 12th time!
The schedule will be the following:
April 12 — it's better to arrive on this day as the conference is going to start on April 13 since morning (we promise, this day will not seem boring to you),
April 13-14 — the conference itself and a personal contest on information security,
April 15 — RuCTF 2018 final contest,
April 16 — awarding and closing ceremony.
We have already sent all the invitations to the teams and very soon the list of invited teams will be made public. The conference program will be published a little later, but it already promises to be useful and fascinating :)
Official website: https://ructf.org/2018/en
You can ask any questions via our email: [email protected]
We published the list of invited teams: https://ructf.org/2018/en/teams/
Today we are starting to introduce you to our conference speakers, since we've published almost complete conference schedule: https://ructf.org/2018/en/events/
On RuCTF 2018 Egor is going to appear with his presentation "Your hash is mine. Pentest in Windows local networks".
A word to the speaker himself:
— This presentation will fully enlighten you about attacks in Windows networks: what the NTLM hashes are, what kinds of them exist, how to steal them and what for. Also a little about bruteforcing hashes and weak passwords. For last I prepared a fascinating RCE for machines in AD domain.
A word to the speaker himself:
— This presentation will fully enlighten you about attacks in Windows networks: what the NTLM hashes are, what kinds of them exist, how to steal them and what for. Also a little about bruteforcing hashes and weak passwords. For last I prepared a fascinating RCE for machines in AD domain.
He is going to tell about internal structure of WinRM and available authentication methods in it, show the way all these methods are organised inside the system and why most of them aren't secure.
The presentation will be of interest both to those who manage Windows on machines via Ansible or WinRM and those who merely use Windows.
The presentation will be of interest both to those who manage Windows on machines via Ansible or WinRM and those who merely use Windows.
Nowadays "smart" devices become more and more popular. Some even say the amount of them is bigger than amount of people on Earth. But we need to ask ourselves whether they are properly secured. Andrey Muravitskiy's presentation will be dedicated to fresh vulnerabilities uncovered by team Kaspersky Lab ICS CERT in different "smart" devices with certain examples and demonstration.
Andrey is a senior security researcher in the team Kaspersky Lab ICS CERT: he started working in Kaspersky Lab in 2016, his specialisations are penetration testing, research of industrial automatisation systems' security, "internet of things" and and different smart devices. He is a member of several CTF teams.
On the second day another talk will be presented by a regular guest of our conference — Dmitry Sklyarov. Dmitry is a head of the department of Positive Technologies application analysis, he is working in the field of information security more than 18 years. He is a developer of an algorithm of Advanced eBook Processor program, published by Moscow company "Elcomsoft" and designed for creation of ebook backup copies in Adobe PDF format.
Intel Management Engine (ME) technology has been around for over 10 years (since 2005), but it seems impossible to find any official information about ME on the Internet. Fortunately, some studies have been published in recent years; however, all of them deal with ME 10 and earlier, while modern computers implement ME 11 (introduced in 2015 for Skylake microarchitecture). In his presentation, he will explain in detail how ME 11 stores its state on the flash and the other types of file systems that are supported by ME 11.