Web Application Security
t2â?²12: Challenge to be released 2012-09-01 10:00 EEST Aug 29 2012 11:01AM
Tomi Tuominen (tomi tuominen t2 fi)
It is that time of the year again - weâ??re pleased to announce the
release of the t2â??12 Challenge!

This yearâ??s challenge starts from the homepage of a young woman who is
rumored to be the girlfriend of an infamous carder. To solve the
challenge, the participants need to step into investigator's shoes and
follow the clues to find all gang members. But this is only where the
challenge begins - each gang member possesses a piece of a secret image
file that they have hidden using their own expertise.

Gang members and their secrets can be revealed in any order. The
scoreboard shows real-time overview of all investigators, as well as
detailed TOP 20 ranking. What is more, this year's challenge will
require a more diverse skillset than ever before. Finding the gang
members from the Interwebs is a challenge in its own right but some
serious ninja skills are required to unravel the hidden image files.

The rules are simple: the first one to solve the challenge will win free
admission to the t2â??12 infosec conference. But donâ??t stop just because
you werenâ??t the first one to solve it: The Advisory Board will select
another winner among the next ten correct answers, paying particular
attention to the elegance of the solution rather than the speed. In
other words you can win with either speed or style :)

The t2â??12 Challenge will be released 2012-09-01 10:00 EEST right here at
http://t2.fi/

Good luck,

--
Tomi 'T' Tuominen <tomi.tuominen (at) t2 (dot) fi [email concealed]>
Founder - t2 infosec conference
tel. +358 400 796 064 - fax. +358 401 796 064

pS. Seriously, this is the best Challenge ever :)

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Darwin)
Comment: GPGTools - http://gpgtools.org

iQIcBAEBAgAGBQJQPfaMAAoJEBflN3v0piV4MB0QAMHm9DBi6sFujkTQljYaBgXq
VLIyKz3XW8RKkx1pEV6l0Obq5sBVrts0uw538PsUWH0JxF4lliiYLgvYL557eSai
FFDda2+rK0DPm8khu9jOjAMYvSRAdCtB/EVus5Jf4ZtK8Er6cE6WENAIGHncZ9r0
Fk4Tuf9HrQAUTV+kW4+NgpJSVnYZicMWXIvWvwjmnO2KseiRVwwc+kNMiIDD6v0e
iIqLnRvWeV6ddHybZ6hUUMzw1CabIViHjh/3GF6gYYh5v7DjS2b2skxmHl+WthFp
c+r3skyeApKXmj9m6hxpvKSMPt+WT9aP29xlXucqi96FA4UwEiINT5GcG4lCa6TR
LH7o7/RIA+PX0YSSlfU6ucn80tlLb0ir0btDxuKOBKdtXiL4kpmViwSqqlmYJn00
l7ILNE+et+Xl3UnzDKHnJjBJSitlCK9BKfRSCgyRw49JGZYSYTgT/lpdscfrJ63t
ptyvAr8SV9wL4flvLgcTaXX3+rUJn/5sHMDs8l5DPSOdK6CQBhDfoVTx4hsjn0zK
GioRSiqv4eBygjEneHgCS33otstKHEVKGmwdKws/BROyinlTWvV2lvXA97fB2taO
gC6cZnG2s+Pk7mR8j9EF8YNXnSkYvUnl0WRHQ9nrYIjQU+8N2/Ez9EWwMjAKopjY
zhWilmXKMOryqcdyevJi
=yhxh
-----END PGP SIGNATURE-----

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus