-
OpenCTF : Ellingson Mineral 2
Category: OSINT Points: 100 Description: We heard word that The Plague escaped prison three weeks ago. We’ve been notified that he was recently seen on soundcloud liking a song by ytcracker called “hacker music.” Let us know what you find. First perform a search on soundcloud.com for “ytcracker hacker music” then go to likes. https://soundcloud.com/ytcracker/ytcracker-hacker-music/likes…
-
BSidesPDX CTF : MakeIcon
Category: Web Points: 300 Description: It’s free, as in baby. Host: ab743120bb6ae11e7ac800aee00def00-1664391948.eu-central-1.elb.amazonaws.com Note The BSidesPDX organizers have made the source code for all of their challenges freely available so that you can run them at home and follow along. You can find more information here. Investigation Upon loading the screen, we are presented with a…
-
BSidesPDX CTF : SeaQuell
Category: Web Points: 200 Description: Our competitors at SeaQuell have uploaded their latest proprietary data to their employee area. We have already compromised their web developer and obtained the source code to their site, here: seaquell.py Host: a32fcd6eab2d811e784db0a6f99bb55a-829124630.eu-central-1.elb.amazonaws.com Port: 1589 Seaquell.py Note The BSidesPDX organizers have made the source code for all of their challenges…
-
DeepSec 2024 Keynote – The Mind Bomb
DeepSec 2024 ended on 22 November 2024. We took a week off to post-process the event in terms of video material and dialogues. Usually only participants get first access to the video recordings, but because of the threat of disinformation from nation states, we published the keynote early and freely. Randahl Fink explained his take…
-
DeepINTEL 2024 – a full Day all about Security Intelligence
The DeepINTEL 2024 security intelligence has begun. The day holds a full day of presentation about current and future threats. It is difficult to describe a TLP:AMBER event, because we do not publish the schedule for DeepINTEL. The term security intelligence has a wide spectrum. Basically, it includes all informations that will help you improve…
-
BSides København – Meaningful Metrics in Information Security
The next BSides København will take place on 9 November 2024. There is one presentation in the schedule about the use of metrics in information security. Computers allow us to create documents, charts, and statistical values easily from any data collection we like. Therefore, the World Wide Web is full of graphs, tables with numbers,…
-
How AI can assess a study’s novelty and impact various industries
Innovative AI tools in scientific research In today’s rapidly evolving world, AI is not just transforming industries but also unlocking new opportunities for innovation across almost all sectors, including research. One such opportunity in scientific research is to create an objective method for evaluating the originality of research: an AI-powered tool for novelty scores. By assessing the…
-
How to Run a Cybersecurity Risk Assessment in 5 Steps
Though cybersecurity is on every executive’s checklist today, most struggle with growing compliance burdens, keeping the costs moderate, and bringing team alignment. A cybersecurity assessment is the key to combating the rising threat environment, and it’s prudent to secure systems before a breach cripples your business. Read this guide, written by Avya Chaudhary for TechRepublic…
-
Quick Glossary: Malware
Malware is an insidious infection that will steal productivity from your enterprise and potentially wreak havoc on your network. To prevent and counteract malware, it’s important to know the terminology surrounding it. This list of terms, written by Mark W. Kaelin for TechRepublic Premium, will help you grasp the vocabulary that describes malware and the…
-
CVE-2024-55577 – Linux Ratfor Buffer Overflow Vulnerability
CVE ID : CVE-2024-55577 Published : Jan. 15, 2025, 6:15 a.m. | 54 minutes ago Description : Stack-based buffer overflow vulnerability exists in Linux Ratfor 1.06 and earlier. When the software processes a file which is specially crafted by an attacker, arbitrary code may be executed. As a result, the attacker may obtain or alter information…