How much does it take to hack a mobile network?
Is electronic government secure
in the era of WikiLeaks and Anonymous?

Is SCADA hacking a Hollywood fiction
or the nowadays reality?
Internet banking: is there any chance to win
over the fraudsters?

Cyber-crimes, cyber-espionage, cyber-war: where do we draw a borderline?

Pages

Monday, May 28, 2012

Registration to PHDays 2012 Online Competitions Is Open


The competitions playing invitation cards to Positive Hack Days 2012 are over. The winners have received their tickets, and we will meet them in the Digital October Center in Moscow very soon. If you have failed to participate in these contests or to win, you still have an opportunity to obtain lots of prizes in the course of online battles, registration to which starts on PHDays website simultaneously with the forum. Competitions description and terms of participation are under the cut.

Hash runner

The competitors will be provided with a list of hash functions generated according to various algorithms (MD5, SHA-1, BlowFish, GOST3411, etc.). Points for each decrypted password are scored according to the algorithm’s level of difficulty. To become a winner, a competitor should gain the most points in a limited period of time, leaving the rivals behind.

Any Internet user can participate in the competition. Participants can register on the PHDays 2012 website after the beginning of the forum. The competition will last 2 days through the whole forum.
The winner will receive a special prize, namely AMD Radeon HD 7970 video card.

WikiLeaks

The competition will enable participants of the forum to find out how quickly and accurately they can find hidden information on the Internet.

The competition web page will contain questions about certain organization, information about which can be found online. The task of the competition participants is to find as many correct answers to the questions as possible in the shortest time. Results will be announced at the end of the second day of the PHDays 2012 forum.

WAF Bypass

This competition is for enthusiasts and experts engaged in web application security. The competitors are to attack vulnerable web applications protected by Web Application Firewall using SQL Injection technique. The applications function in connection with DBMSes of various vendors.

Participants will be offered to attack (or demonstrate the attack possibility) for the purpose of gaining data from a DBMS. There are four vulnerable web applications employed in the contest, each of them uses its own DBMS type. All attacks exploiting any SQL injection vector, inclusive of gaining file system access, OS commanding, brute force and binary search attacks are counted.

The winner is the first who implements an SQL injection exploitation technique in one of the web applications.

The winner will be awarded Apple iPad 3. The best ten competitors will receive prizes and gifts from Positive Technologies (the PHDays organizers) and from the forum sponsors.

Best Reverser

Participants of the competition will have to pick an electronic lock, as well as to hack the algorithm of our keygenme and to provide generated code sequence relative to the user name that will pass testing.

The first place will be awarded for fully restored functioning algorithm of the electronic lock and for the opening key, as well as for the fully restored algorithm of code sequence generation for any name. The prize is Apple iPad 3.

The second place: full description of the electronic lock functioning and of the algorithm for code sequence checks. A key to the lock and code sequence for your name (username) must also be provided. The prize is Amazon Kindle Fire.

The third place: full description of the electronic lock functioning and of the algorithm for code sequence checks. A key to the lock or code sequence for your name (username) must also be provided. The prize is Amazon Kindle Touch.

PHDays Online HackQuest

The PHDays 2012 program will include Online HackQuest, a competition for the Internet users that offers participants to try their hands at solving various information security tasks. On the forum’s second day, Online HackQuest participants will have a chance to influence the results of PHDays CTF 2012.

For the competition, participants are provided with access to a VPN gateway. After connecting to it, the participants are to identify target systems and detect their vulnerabilities. If exploitation of a vulnerability is successful, the participant gains access to a key (a flag), which should be submitted to the jury via the form on the participant’s personal page. If the flag is valid, the participant gains the corresponding number of points.

All flags are in the MD5 format. The winner is the first participant to gain 100 points (which is the maximum possible amount). Participants who manage to gain more than 100 points are traditionally awarded with individual prizes :)

the Online HackQuest will also be available for out-of-competition participation during 14 days after PHDays 2012.

Please see any details about the competitions and prizes on the official website of Positive Hack Days 2012.

P. S. As part of PHDays Everywhere dozens of hackspaces in Russia and abroad will be open for everybody who wants to dive into the atmosphere of a place, where hackers hang together, and to watch PHDays in a video conference mode at the same time.

P. P. S. You can watch all forum events online. Please register to obtain this opportunity. Twitter will be used to ask the speakers any questions (see details on the official website of the forum) and to partake in discussions with the forum’s guests using our hashtag #PHDays.

1 comment:

  1. A very good post ,I like it very much ,hope you will give another post asap Great info Thanks!
    Web Application Firewall

    ReplyDelete