RuCTF in english [DEPRECATED]
91 subscribers
192 photos
8 videos
6 files
101 links
RuCTF is annual open intercollegiate competition and conference on information security.
This is old channel, please follow @RuCTF
Download Telegram
Plan for tomorrow:

Registration for the Olympiad will start at 10 am.

At 11 starts the tour, which will last about 5 hours.

Please, bring your student ID with you, if you want to take part in the Olympiad.

You can participate outside the standings, come a little earlier than 11.

In parallel, there will be reports, their schedule you can found here: https://ructf.org/en/events/

We will broadcast again!

In this time we will try to fix the problems with the sound.

We remind the bus schedule for April 27.
We are distributing passwords to the Olympiad. So, come to the reception!
The final of the All-Russian Student Olympiad begins at 11.00

In parallel with the conference, which is opened by the report “Artificial intelligence in intelligent systems today and in the future" by Kirill Sherbin from GlowByte Consulting
Stream:

https://youtu.be/kNGF1xwHCz0

Will start soon!
Go listen to Kirill’s report to the conference room!
Let’s go!
Olymp.RuC.TF
Egor Litvinov speaks with the report “Reverse engineering of Android applications for beginners"
Olymp’s participants, please read Notifications in CTFd
Attention! The Olympiad will last 4 hours, not 5.
Right now: “HRAST: automatic processing of the HEX-RAYS output", George Zaytsev, Positive Techologies
The speaker from Positive Technologies department of app analysis specialist and mentor of SPbCTF community.
He will tell you about his tool that automates work with HexRays decompiler output with help of IDAPython and will show how and why it will help you in reverse development process.
Sudden changes in the talks!

There will be another talk at the conference. Rustam Mirkamysov will present the talk on topic "Three cases from life of reverse-engineer from Group-IB"

He is a representative of Group-IB, head of department of dynamic analysis of malicious code
He’ll start at 14.30
Watch the broadcast, don’t forget about it!(if you are not here).

Works left and right channel, hurray!

https://youtu.be/kNGF1xwHCz0
Lockpick started in HackZone at 15 hrs, and other activities are already in progress.

Quest awards will be given out at 16.

After that:
- Lockpick talk may be repeated
- Talk "Study: additional information that devices may hold (firmware/configurations/uefi) with it's modification

And later - continuation of activities (Lockpick, mechanical keyboards, quests (no awards this time))
Quest awards will be after 5 minutes in Hack Zone!
16.00 “Undocumented functionality of Qualcomm-based modems - critical vulnerabilities and great possibilities” by Shadowsoul in Hardware Village
Series of non technical talks will start at 16:00. First one is "Work of pentest team" by Sergey Krasnov, representative of USSC.

He will tell you about pentesters day to day life, which problems he's facing, what's great in his work. And he will answer the main question: why do you do this?
The talk will be presented in form of several interesting real life stories with technical details and other insider info.