This brief note illustrates how simple it is to circumvent password protected machines, even if they have encrypted hard drives and the latest patches with a great little tool called Inception.
Inception is a useful tool if you’re doing close quarters security testing, i.e. you have physical access to the target device, think, a laptop […]
First off I’d like to say a big thank-you to all the KPMG bods who put this bonus challenge together, it was great fun and a damn site harder than the main part of the challenge.
I’ve put this solution up as I was the only person to solve it (outside of KPMG), whether that’s […]
The folks at Cyber Security Challenge, the FCO, PWC and GCHQ set a series of challenges last year, this was one devised by Senad Zukic a winner from a previous challenge to coincide with the London Conference on Cyberspace.
The challenge was to find the hidden message in an image.
This image top […]
Tags1394 Blowfish BSides challenge cipher cryptography CSCUK cyber security encrpt exiftool exploit firewire forensics gimp grep hexdump inception JSON Malware msieve obfuscation pcap PDF pdf-parser pdfid pdfseparate PwC RC4 Reverse Engineering RSA RSyslog SBP-2 security Splunk steganography TEA TrueCrypt turing UK Cyber Challenge vhd VM voip web security wireshark