Web Application Security
t2â??14 Challenge to be released 2014-09-13 10:00 EEST Sep 07 2014 07:28AM
Tomi Tuominen (tomi tuominen t2 fi)
Running assets is always difficult, however this year has been excruciating for t2 infosec. We lost one of our most prized and well placed deep cover operatives in a foreign three letter agency. Shortly after the CFP, communications stopped and we have to assume her new assignment is a permanent placement at a black site somewhere in Eastern Europe.

Luckily for us, the person was able to exfiltrate a key piece of an intelligence analysis system before disappearing. In order to turn the tables and go for the pride-and-ego down, our intention is to burn this capability once and for all.

Y-LOCKPOINT is designed for searching and analyzing compromised computer systems. Despite the OPSEC failures, which allowed us to gain access to front-end application, the binary is well-protected â?? preliminary analysis indicates emphasis on multi-layer protection and resistance to analysis.

Your mission, should you choose to accept it, is to participate in the crowdsourced reverse engineering effort of the acquired front-end binary.

The first person to recover all content will win a free ticket to t2â??14 conference. In addition to this, the creators of the Challenge will select another winner among the next ten correct answers. The criteria for the other selection is the elegance of the answer. In short, you can win with both speed and style.

For details, please refer to:
https://t2.fi/challenge/t214-challenge/

The t2â??14 Challenge will be released 2014-09-13 10:00 EEST right here at https://t2.fi/

Good luck,

T

--
Tomi 'T' Tuominen | Founder @ t2 infosec conference | https://t2.fi

-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
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=lusQ
-----END PGP SIGNATURE-----

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus