At BSides 2016 I participated in their Hackers Challenge. The challenges were based on reverse engineering, network packet analysis, and many other puzzles that you needed to figure out. When I had hit the wall at 3AM in the morning on March 11th I was in 2nd place. By the end of the competition which was at 10AM I had dropped to 7th. The challenge was great! Thanks BSides...
Check-out the django.nV project. This is a project that was used in the Hackers Challenge but was adapted from its original state.
Screenshot of being in 2nd place at 3AM.
Screenshot of being in 7th place at the end of the competition.
One thing to note is most of the challenges were worth 4,000 points in the beginning. If you did the challenge and no-one else you kept the 4,000 points. For each participant that accomplished the challenge you had to divide the points with them.
Twitter: @lokut
This blog is for educational purposes only. The opinions expressed in this blog are my own and do not reflect the views of my employers.
Subscribe to:
Post Comments (Atom)
Test Authentication from Linux Console using python3 pexpect
Working with the IT420 lab, you will discover that we need to discover a vulnerable user account. The following python3 script uses the pex...
-
Here is a quick walk through of GetBoo. The first item that I found was you can harvest the usernames of the existing users that are regist...
-
As I was glancing through the logs of my honeypots I spent some time to look at the following logs. In the past I have just overlooked them...
-
I thought I would work through a few of these web applications provided by OWASP on their broken web applications VM. The first one I th...
-
Today looking at the logs of the honeypots, I became curious based on the whois of the IP Addresses attempting to login to SSH which country...
-
Recently I was doing some scanning with a tool that is available on github called masscan. The tool allows you to configure a configuration...
No comments:
Post a Comment