by Athan Georgopoulos | Sep 26, 2017 |
Category: Cryptography, Steganography You can download the Cryptography Challenge, along with all the challenges for the 2016 Greek Qualifier CTF of European Cybersecurity Challenge, in this link. More details on the Greek ECSC 2016 Qualifier CTF event can be...
by Athan Georgopoulos | Sep 12, 2017 |
Category: Digital Forensics You can download the Memdump-Digital Forensics Challenge, along with all the challenges for the 2016 Greek Qualifier CTF of European Cybersecurity Challenge, in this link. More details on the Greek ECSC 2016 Qualifier CTF event can be found...
by Athan Georgopoulos | Jul 6, 2017 |
Category: Reverse Engineering, Crypto, Ransomware You can download the Ransomware Challenge, along with all the challenges for the 2016 Greek Qualifier CTF of European Cybersecurity Challenge, in this link. More details on the Greek ECSC 2016 Qualifier CTF event can...
by Athan Georgopoulos | Jun 26, 2017 |
Category: Reverse Engineering Note: You can download the Reverse Engineering Challenge, along with all the challenges for the 2016 Greek Qualifier CTF of European Cybersecurity Challenge, in this link. More details on the Greek ECSC 2016 Qualifier CTF event can be...
by George Koukoumpedakis | Jun 19, 2017 |
Every now and then during our penetration tests, we come across a Java Thick Client application which uses HTTP to communicate with a server. This allows us, of course, to intercept and manipulate requests/responses using one of our favorite tools, Burp suite. Java...
by Yiannis Koukouras | Jun 11, 2017 |
In 2016, it was the first time that Greece participated in the European Cyber Security Challenge (ECSC 2016), organized by ENISA. The formation, training and coaching of the Greek National CyberSecurity team was a purely community-driven event, organized by TwelveSec...