How much does it take to hack a mobile network?
Is electronic government secure
in the era of WikiLeaks and Anonymous?

Is SCADA hacking a Hollywood fiction
or the nowadays reality?
Internet banking: is there any chance to win
over the fraudsters?

Cyber-crimes, cyber-espionage, cyber-war: where do we draw a borderline?


Tuesday, May 15, 2012

What to Take Along to PHDays? Competitions on the Forum Platform

You will have a possibility to listen to reports of famous information security experts and young researches, participate in workshops and master classes, watch CTF hackers’ epic battle on May 30—31 in Moscow at the Positive Hack Days forum. But that’s not the half of it! You will be able to challenge the heroes of hack battles and prove to be a member of the hacking elite. The list of competitions that will take place in the Digital October Center during Positive Hack Days 2012 is under the cut.

Attention! Please take along a laptop to participate in the following competitions.


The participants of the competition should demonstrate their exploits (each participant gets three attempts to attack). The competition is divided into three categories: exploitation of vulnerabilities in a browser, in mobile devices, and exploitation of kernel vulnerabilities.

All the preregistered specialists can participate in the competition. Please send your applications to (the last day of registration is May 28, 2012).

If a competitor cannot attend the forum in person, the organizers of the forum may demonstrate the exploit on behalf of the author by pervious agreement.

In 2011, the winners of the Hack2own competition were Nikita Tarakanov and Alexander Bazhanyuk, representatives of the CISSRT team, who demonstrated 0day vulnerability (CVE-2011-0222) in the latest version of Safari (Internet browser) for Windows and took the first prize, namely a laptop and 50,000 rubles. Description of the detected vulnerability was forwarded to Apple. A few days later the manufacturer acknowledged the problem.

The copyright on the programs and techniques used at the forum belong fully to their author and are not transferred to the forum organizer.

Too Drunk to Hack NG

The competitors should successfully hack a web application protected by a Web Application Firewall (WAF). The web application, in turn, contains a limited number of vulnerabilities, consecutive exploitation of which allows executing OS commands.

The whole competition takes 30 minutes. Every 5 minutes the competitors whose actions caused a more frequent WAF reaction are offered 50 g of a strong drink to proceed with the competition.

The winner is the first who manages to capture the principal game flag on the stage of executing OS commands on the server. Vladimir Vorontsov, an expert of security (after six attempts he managed to find all necessary vulnerabilities), won this competition last year.

Fox Hunting NG

The participants should detect 802.11 a/b/g/n wireless access point with a pre-defined ESSID or crack the WPA-PSK encrypted password used for access to the wireless network. The access point location will change with time.

To become a winner a participant must accomplish at least one of the tasks:

  • to become the first who detects the exact coordinates of the current wireless access point location and to inform the organizers about it;
  • to become the first who cracks the password of the access point and to inform the organizers about it.

You’ll need creative skills and will to win in addition to laptops (or instead of them) to partake in this competition :)

Don’t copy that floppy

The participant will have to find information media (floppy disks of various types) hidden by the organizers. Moreover, they will have to find a way to read the data stored on the floppies. The floppies can be anywhere: on a wall or behind a column, under a table or on a chair back, or just lying somewhere on the floor in the corner.
The collected media and the read information (in any form that allows identifying the stored data) must be submitted to the organizers in the contest area. A participant who will manage to find and read the largest number of floppies wins. The winner will be decided on the second day of the forum.


The participants will be asked to first call a predefined number from an authentic soviet telephone using tokens as the means of payment and then extract the used token and give it back to the jury. The contest results will be announced on the second day of the forum. The winner will be selected basing on how fancy the used extraction method was.

Competitors are prohibited from performing any actions that may damage the competition telephone!


The competition allows the participants to check their knowledge and skills in exploiting typical vulnerabilities in online banking system web services. The competition tasks will include actual vulnerabilities of Internet banking applications detected by Positive Technologies specialists while analyzing security of such systems.

The contest is held in two stages. At first the participants are provided with copies of virtual machines containing vulnerable web services of an online banking system (an analogue of an actual Internet banking system). The participants should detect vulnerabilities in the system within a specified period of time. At the second stage the participants are to exploit these vulnerabilities for unauthorized money withdrawal within a limited time.

Following the results of the contest each participant gets a monetary reward equaling to the amount of money stolen from the game Internet bank service.

Big Shot

A participant is given a photo of a person and a number of statements that characterize this person. (The person is one of the attendees of the forum). The participant’s goal is to identify the person and make certain actions according to the task, for example, to get the person's business card or to take a photo of the both from a specified angle. The winner is a participant who will cope with the largest number of tasks for the shortest period of time. The results will be summed up on the second day of the forum.

The participation requires such qualities as determination, excellent social skills and charisma. Neuro-linguistic programming skills at level 137 are an advantage :)

Hack the RFID

The participants will be provided with two stationary boxes under locks controlled by RFID readers. The corresponding RFID tags will be attached at a distance from the readers so that it is impossible to unlock the boxes directly with these tags. The participants will be invited to open one or both boxes and take the prizes from within.


Every forum attendee has an opportunity to stand out of competitors and colleagues putting on his or her own ‘hack-t-shirt’ which he or she considers the most interesting or funny, stylish or amusing. Special agents on the part of the PHDays organizers will take photos of all participants wishing to partake in this competition. The winner will be declared on the second forum day.

Positive Technologies (the PHDays organizers) and the sponsors of the forum provide prizes and gifts for the competition. The full list of competitions is available on the official web site of Positive Hack Days 2012.

As you can see all participants will have a chance to prove themselves. See you at Positive Hack Days 2012!


  1. I know that there are a lot of useful platforms in the Internet. On I found really useful info in cheap writing.

  2. Sites that offer coupons and deals online are very popular. Running a coupon website involves listing Flipkart Coupons and sales, you make money from paid

  3. If you are finding best digital marketing company in Ghaziabad, Delhi and Noida. So, you can go with Orange Global Digital Marketing company. This company are working last 5 Year in this digital marketing fides. So you can grow your business with us.

  4. Naturally, it would take considerably longer and be more expensive if headed to other parts of the country. There are separate busses each serving Heathrow Central (Terminals 1, 2 and 3), Terminal 4 and Terminal 5. Passengers arriving via Philippine Airlines will have to use the stops 13 and 14 at Terminal 4.
    minibus hire norwich
    manchester taxi hire
    emergency minibus hire
    minibus hire sheffield
    minibus hire falkirk


  5. Your very own commitment to getting the message throughout came to be rather powerful and have consistently enabled employees just like me to arrive at their desired goals.

    Top Angularjs Training in Chennai
    Top Java Training in Chennai
    Top Bigdata Hadoop Training in Chennai
    Top SAS Training in Chennai
    Top Python Training in Chennai
    Top Software Testing Training in Chennai

  6. Speaking about difference between coursework and assignment we should say that small assignments that you write during the year are your steps to the successful coursework

  7. Here we provide the all latest exams results notifications and job alerts in our website. Its is a best platform for students and those who are searching for sarkari job notification directly visit our site to get job notification,admit card,syllabus,answer key, results at latest exam result site .

  8. Hello! If you happen to have some writing problems, then I know what can help you to make it easier. When you start to look for some useful service you can find elite essays affiliate and many other.

  9. Thus, for offering the protection to the users’ device using the McAfee antivirus products, they need to follow the interrelated procedures listed below:

  10. If you are a busy student, you will find the services of this writing company very qualitative. Visit the website and look for yourself.

  11. Keep on sharing great ideas and information! We appreciate it and continue your great work!

    Denver NC Stereo Installation