I played the Juniors CTF 2016 this weekend with some friends of mine and it was quite fun! Since we missed the
registration deadline, I sneakily joined the Securimag team and played with them.
Among the different web challenges that we solved, @xarkes and I thought that
Crypto-shop was one of the most interesting challs from the web category.
First of all, wow it's been a while and a lot of things happened since last time I wrote something on my little spot of
the Internet...
Last weekend I played the D-CTF Qualifiers 2016 with some friends of mine (@xarkes,
jfrankowski and a new friend of mine). I was told that it is not a good CTF due to multiple problems
in previous version with the challenges, where for instance some exploit challenge would not be solvable at all. And
apparently it was the same this year (see the comments) and it was frustrating at some
point...
However, it didn't stop us from having quite a blast. One in particular, the Super Secure Company LLC web challenge,
worth 300 points. We used our best tool in French history, called puputerie, or how to gain 300 points like a
dipsh*t!
If you're interested, keep reading and I hope you'll forgive me.
I just came back from my trip to Amsterdam where I gave a lightning talk about
OWTF for the AppSec EU 2015 :)
I also went there for the OWASP Project Summit where I met some of the other OWTF developers and my dear friend
Abe, finally!
Last week-end I participated to the qualifications of NdH with
HackGyver (scoreboard). We gathered at the
hackerspace's local with futex, kiwhacks and pastrep (a new member met at the SecuRT 2015). We
finished 32 over more than 200 teams that validated at least one challenge. It is not that bad, knowing that some of
our key comrades where not available this Saturday.
I had to do some stuff that I never did before and it was really fun. That is why I wanted to do the write-up of the
Clark Kent reverse engineering challenge.
Last week-end I participated to the qualifications of NdH with
HackGyver (scoreboard). We gathered at the
hackerspace's local with futex, kiwhacks and pastrep (a new member met at the SecuRT 2015). We
finished 32 over more than 200 teams that validated at least one challenge. It is not that bad, knowing that some of
our key comrades where not available this Saturday.
I thought that I could write something about their faceBox web
challenge.