Cenzic 232 Patent
Paid Advertising
sla.ckers.org is
ha.ckers sla.cking
Sla.ckers.org
If you have some interesting news or want to throw up a link to discuss it, here's the place. Anything is okay, even shameless vendor launches (since that is often applicable to what we work on). 
Go to Topic: PreviousNext
Go to: Forum ListMessage ListNew TopicSearchLog In
Online competitions on PHDays 2012
Posted by: s4avrd0w
Date: May 27, 2012 06:53AM

If by any reason you do not get into the participant list of Positive Hack Days 2012 (http://phdays.com) or cannot visit Digital October Center, the forum’s platform, on May 30 and 31, you still have an opportunity to participate in this event. Join the online battle with competitors from all over the world at Positive Hack Days 2012! Description and participation terms are under the cut.

Hash runner (http://phdays.com/program/contests/#6332)

The competitors will be provided with a list of hash functions generated according to various algorithms (MD5, SHA-1, BlowFish, GOST3411, etc.). Points for each decrypted password are scored according to the algorithm’s level of difficulty. To become a winner, a competitor should gain the most points in a limited period of time, leaving the rivals behind.

Any Internet user can participate in the competition. Competitors can register during PHDays on the forum's website. The competition will be held as part of PHDays 2012 and will last through the forum days.

WAF Bypass (http://phdays.com/program/contests/#6321)

This competition is for enthusiasts and experts engaged in web application security. The competitors are to attack vulnerable web applications protected by Web Application Firewall using SQL Injection technique. The applications function in connection with DBMSes of various vendors.

Participants will be offered to attack (or demonstrate the attack possibility) for the purpose of gaining data from a DBMS. There are four vulnerable web applications employed in the contest, each of them uses its own DBMS type. All attacks exploiting any SQL injection vector, inclusive of gaining file system access, OS commanding, brute force and binary search attacks are counted.

The winner is the first who implements an SQL injection exploitation technique in one of the web applications.
The winner will be awarded Apple iPad 3. The best ten competitors will receive prizes and gifts from Positive Technologies (the PHDays organizers) and from the forum sponsors.

WikiLeaks (http://phdays.com/program/contests/#6325)

The competition will enable participants of the forum to find out how quickly and accurately they can find hidden information on the Internet.

The competition web page will contain questions about certain organization, information about which can be found online. The task of the competition participants is to find as many correct answers to the questions as possible in the shortest time. Results will be announced at the end of the second day of the PHDays 2012 forum.

Best Reverser (http://phdays.com/program/contests/#6323)

This competition enables the participants to try their skills in reverse engineering of executable files for MS Windows platform. Every participant gets a program specially crafted for analysis. There are no limitations on techniques or software used for capturing the flags (except for the applicable laws of the Russian Federation). The winner is the first who gets all three flags and shortly describes the ways to get them.

The participants who deal with the competition tasks later than the winner or get less than three flags take the second and third places by the jury’s decision.

PHDays Online HackQuest 2012 (http://phdays.com/program/contests/#6330)

The PHDays 2012 program will include Online HackQuest, a competition for the Internet users that offers participants to try their hands at solving various information security tasks. On the forum’s second day, Online HackQuest participants will have a chance to influence the results of PHDays CTF 2012, the on-site contest.

For the competition, participants are provided with access to a VPN gateway. After connecting to it, the participants are to identify target systems and detect their vulnerabilities. If exploitation of a vulnerability is successful, the participant gains access to a key (a flag), which should be submitted to the jury via the form on the participant’s personal page. If the flag is valid, the participant gains the corresponding number of points.

PHDays Online HackQuest 2012 (http://phdays.com/program/contests/#6330): recon, networking, crypto, web, reversing, forensics, exploiting and much more!

Online HackQuest will also be available for out-of-competition participation during 14 days after PHDays 2012.

Registration is now open: http://phdays.com/personal/?register=yes

Options: ReplyQuote


Sorry, only registered users may post in this forum.