rcejunk.blogspot.com
RCE junk: Shmoocon 2011 Crypto Challenge Pack
http://rcejunk.blogspot.com/2011/02/shmoocon-2011-crypto-challenge-pack.html
Shmoocon 2011 Crypto Challenge Pack. The Ghost In The Shellcode organizers gave me the privilege again this year to write some challenges for their CTF event. Here are the contents of the README:. Shmoocon 2011 Cryptography Challenge Pack. Http:/ www.ghostintheshellcode.com/. Https:/ www.shmoocon.org/ghost in the shellcode. These are the cryptography challenges submitted to the Shmoocon 2011 "Ghost In. The Shellcode" organizers for potential use in the CTF event and December. Values between external tools.
blog.trailofbits.com
Ryan Stortz – Trail of Bits Blog
https://blog.trailofbits.com/author/withzombies
Trail of Bits Blog. 4E78 641E 4054 5085 81B6 5712 6BA3 5E19 0B22 E10F. 2000 cuts with Binary Ninja. June 3, 2016. Using Vector35’s Binary Ninja. A promising new interactive static analysis and reverse engineering platform, I wrote a script that generated exploits for 2,000 unique binaries in this year’s DEFCON CTF qualifying round. If you’re wondering how to remain competitive in a post-DARPA DEFCON CTF, I highly recommend you take a look at Binary Ninja. Develop a Cyber Reasoning System; an unrealistic ...
blog.trailofbits.com
The Foundation of 2015: 2014 in Review – Trail of Bits Blog
https://blog.trailofbits.com/2015/01/05/the-foundation-of-2015-2014-in-review
Trail of Bits Blog. 4E78 641E 4054 5085 81B6 5712 6BA3 5E19 0B22 E10F. The Foundation of 2015: 2014 in Review. January 5, 2015. We need to do more to protect ourselves. 2014 overflowed with front-page proof: Apple, Target, JPMorgan Chase. Et cetera. Et cetera. 1 Open-source framework to transform binaries to LLVM bitcode. Our framework for analyzing and transforming machine-code programs to LLVM bitcode became a new tool in the program analysis and reverse engineering communities. McSema. The spate of na...
ysuiseha.org
Youngstown State University Information Security and Ethical Hacking Association — Competitions and Games
http://www.ysuiseha.org/competitions.php
Collegiate Cyber Defense Competition. Blue Team / Red Team. Team of 8 (plus 2 alternates); maximum of 2 Graduate Students. Full-time College Undergraduate and Graduate Students. January 1, 2014. February 8, 2014. April 27, 2014. CSAW CTF (Capture the Flag). Anyone (Qualification Round), College Undergraduate Students (Final Round). September 19, 2014. CSAW HSF (High School Forensics). Team of 1 to 3. September 18, 2014. Blue Team / Red Team. Team of 5 (plus 1 alternate). Yes, $195 or $395. October 8, 2014.
cybercompex.org
Competitions | CyberCompEx
https://www.cybercompex.org/category/competitions
Http:/ www.securitybsides.com/.e/28895781/BSidesMSP. Last Post: About BSidesMSP. 5,276,262,637 LINES OF CODE WRITTEN BY STUDENTS. Last Post: About Code.org. What does Pre-Event, In-Event and Post-Event mean? Last Post: Competition Metric Guidelines: Description. LThe Cyber 9/12 Student Challenge is designed to offer students, across a wide range of academic disciplines, a better understanding of the policy challenges associated with cyber conflict. Last Post: About the Cyber 9/12 Project. Welcome to the ...
repoog.com
皓 仁 » CTF领域指南
http://www.repoog.com/2015/02/ctf-field-guide
Https:/ trailofbits.github.io/ctf/. Trailofbits团队发布在Github上的 CTF Field Guide ,本人已与对方联系获得翻译授权,由于手册内容尚在更新过程中,故有部分缺失。 Ldquo;Knowing is not enough; we must apply. Willing is not enough; we must do.” 仅仅知道还不够,我们必须付诸实践。 Mdash;— Johann Wolfgang von Goethe. 评估这种专业性的一种近似方法已经出现 “夺旗”比赛。 Ghost in the Shellcode Gits. 有一些仅做防御的比赛也将自己看作是CTF比赛,主要是高校网络防御挑战赛 CCDC,Collegiate Cyber Defense Challenge 及其地区比赛,我们的建议是你应该无视这些比赛。 虽然他们乐此不疲的将自己作为红队 Red Team 看待. 编辑注 这是为pentest.cryptocity.net编写的一篇较老的文章,我们正在更新过程中。 The Myths of Security.
stratum0.org
Termine – Stratum 0
https://stratum0.org/wiki/Termine
Diese Seite dient als Datengrundlage für den Termin-Bot, der den Terminkalender auf der Hauptseite. Pflegt. Den Kalender gibt es auch abonnierbar als iCal. Verstrichene Termine werden automatisch nach etwa 3 Monaten ins Archiv. Verschoben. Um einen gewissen Rückblick zu ermöglichen, sollten verstrichene Termine immer nur als Kopiervorlage verwendet werden und nicht durch Bearbeiten in eine Folgetermin verwandelt werden. Bier brauen für 5tratum-Feier (Küche nur beschränkt nutzbar). 09052016 13:11 - 20:41.
SOCIAL ENGAGEMENT