by Athan Georgopoulos | Jul 6, 2017 |
Category: Reverse Engineering, Crypto, Ransomware You can download the Ransomware Challenge, along with all the challenges for the 2016 Greek Qualifier CTF of European Cybersecurity Challenge, in this link. More details on the Greek ECSC 2016 Qualifier CTF event can...
by Athan Georgopoulos | Jun 26, 2017 |
Category: Reverse Engineering Note: You can download the Reverse Engineering Challenge, along with all the challenges for the 2016 Greek Qualifier CTF of European Cybersecurity Challenge, in this link. More details on the Greek ECSC 2016 Qualifier CTF event can be...
by George Koukoumpedakis | Jun 19, 2017 |
Every now and then during our penetration tests, we come across a Java Thick Client application which uses HTTP to communicate with a server. This allows us, of course, to intercept and manipulate requests/responses using one of our favorite tools, Burp suite. Java...
by Yiannis Koukouras | Jun 11, 2017 |
In 2016, it was the first time that Greece participated in the European Cyber Security Challenge (ECSC 2016), organized by ENISA. The formation, training and coaching of the Greek National CyberSecurity team was a purely community-driven event, organized by TwelveSec...
by Iosif Androulidakis | Jun 2, 2017 |
Introduction Unless you have been living in a cave, you most probably have heard about the General Data Protection Regulation (GDPR) fuzz. Even worse, you might be responsible for actually implementing GDPR in your company/organization. Although the fines and...