This brief note illustrates how simple it is to circumvent password protected machines, even if they have encrypted hard drives and the latest patches with a great little tool called Inception.
Inception is a useful tool if you’re doing close quarters security testing, i.e. you have physical access to the target device, think, a laptop […]
Sometimes in security you’re given all the information you need – it’s just a matter of recognising it. This challenge is about digging below the surface and interacting with what you find.
The image […]
Business at Fat Dex’s Diner is down and he’s blaming it on a new joint opening up on the East Side, Iggy’s Eats. He also claims to have evidence that Iggy has stolen one of his secret recipes, but this proof is encrypted and Dex doesn’t have the key.
Can you help Packet […]
Welcome to the KPMG LLP challenge, this CTF will hopefully intrigue and inspire you. There are many stages to complete so we hope you enjoy it.Your mission, if you choose to accept it, is to follow the clues and be the first at capturing the flags.
Download the file HERE
Taken from Cyber Security Challenge website:
Our objective with this challenge has been to draw in some concepts from the types of real world intrusions that PwC incident response teams investigate for clients around the globe. In just the last few years we’ve observed huge advances in the […]
If you have ever used Splunk to read messages that come in multiple formats you will know that it will normally only take the first format it comes across.
I use rsyslog for transporting my messages from system to system and Splunk does a great job of parsing the […]
To mark the centenary of Alan Turing the UK Cyber Challenge and PWC’s Senad Zukic devised a cunning cipher. This was a tricky cipher as it was not only old school ciphers and systems but also had a nice twist in the middle.
The cipher for the challenge is the image below, if you want […]
First off I’d like to say a big thank-you to all the KPMG bods who put this bonus challenge together, it was great fun and a damn site harder than the main part of the challenge.
I’ve put this solution up as I was the only person to solve it (outside of KPMG), whether that’s […]
The folks at Cyber Security Challenge, the FCO, PWC and GCHQ set a series of challenges last year, this was one devised by Senad Zukic a winner from a previous challenge to coincide with the London Conference on Cyberspace.
The challenge was to find the hidden message in an image.
This image top […]
Tags1394 Blowfish BSides challenge cipher cryptography CSCUK cyber security encrpt exiftool exploit firewire forensics gimp grep hexdump inception JSON Malware msieve obfuscation pcap PDF pdf-parser pdfid pdfseparate PwC RC4 Reverse Engineering RSA RSyslog SBP-2 security Splunk steganography TEA TrueCrypt turing UK Cyber Challenge vhd VM voip web security wireshark