OUR BLOG
Greek Cyber Security Challenge 2016 write-ups part 4: Gavrila Crypto
Category: Cryptography, Steganography You can download the Cryptography Challenge, along with all the challenges for the 2016 Greek Qualifier CTF of European Cybersecurity Challenge, in this link. More details on the Greek ECSC 2016 Qualifier CTF event can be...
Greek Cyber Security Challenge 2016 Writeups part 3: Panos Memdump-Digital Forensics
Category: Digital Forensics You can download the Memdump-Digital Forensics Challenge, along with all the challenges for the 2016 Greek Qualifier CTF of European Cybersecurity Challenge, in this link. More details on the Greek ECSC 2016 Qualifier CTF event can be found...
Greek Cyber Security Challenge 2016 Writeups part 2: dxflatline Ransomware
Category: Reverse Engineering, Crypto, Ransomware You can download the Ransomware Challenge, along with all the challenges for the 2016 Greek Qualifier CTF of European Cybersecurity Challenge, in this link. More details on the Greek ECSC 2016 Qualifier CTF event can...
Greek Cyber Security Challenge Write-Ups 2016 part 1: Gavriil Reverse Engineering
Category: Reverse Engineering Note: You can download the Reverse Engineering Challenge, along with all the challenges for the 2016 Greek Qualifier CTF of European Cybersecurity Challenge, in this link. More details on the Greek ECSC 2016 Qualifier CTF event can be...
Pentesting Java Thick Clients using Burp and JDSer-DComp
Every now and then during our penetration tests, we come across a Java Thick Client application which uses HTTP to communicate with a server. This allows us, of course, to intercept and manipulate requests/responses using one of our favorite tools, Burp suite. Java...
ECSC 2016 Greece CTF writeup series – Intro
In 2016, it was the first time that Greece participated in the European Cyber Security Challenge (ECSC 2016), organized by ENISA. The formation, training and coaching of the Greek National CyberSecurity team was a purely community-driven event, organized by TwelveSec...