I am writing with some bad news. Despite renewed advertising effort and pulling in favours left, right and centre, we are left with no choice but to cancel the Dunedin In2securITy event due to lack of interest and spiralling costs.
I realise this is a disappointment. Believe me when I say that this has been the hardest decision I have had to make for this scheme.
I hope you can accept and understand - if not forgive this decision.
If you have any questions, please get in touch.
Director - in2securITy
A new level attacks from the long grass! In2security uses spoilers.... it's super effective!
Click 'read more' to see the solution that we found for the Stripe CTF Level 2.
So, you've beaten level 0 and are now at the heady heights of level 1, where we are faced with another simple webapp that is hiding a secret from us.
In this webapp, guessing the secret combination (which is stored in the file 'secret-combination.txt' will print out the password to level 2 (stored in the file 'level02-password.txt').
Not ready to read the spoiler yet but want a tip? This challenge is based around a PHP script. One of the best ways to start is to check out the source and look up any procedure calls you are not familiar with in the PHP Documentation
Click, read more to view the full solution.
A short post this morning looking at the very first Stripe Web CTF level.
By now you should have popped along to the Stripe Web Capture The Flag challenge and had a go at the first of the 8 puzzles.
Don't forget however, the Stripe CTF is only available online for a week or so - you might want to get a wriggle on.
So anyway, for those of you stuck or who have completed level 0 - click the read more button now.
On Saturday 18th August, in2securITy entered uncharted territory. In a pretty swish lecture theatre at the University of Waikato, the in2securITy team delivered a full free day of talks and hands on sessions to almost 50 aspiring IT Security professionals.
From @feabell doing a hands on session of incident response and teaching us how to extract malware from tcp traffic (without compromising your own machine), to Dean Carter teaching us about Myths and Legends of the security industry (and cattle grids), everyone took something away from it.
The time has come ladies and gentlemen of Hamilton for you to host and attend the first ever event of the first ever in2securITy national tour.
So without further ado, here are the much anticipated details of this flagship event.
Saturday 18th August 2012 in2securITy is in you!
If you haven't signed up but want to do so - there is still time. Just visit the signup page (http://www.regonline.com/in2securityisad12hamilton).
The Schedule and Talks
Location: The Opera House, 111 - 113 Manners St, Wellington
Date: Sat 17th Nov 2012 - Sun 18th Nov 2012 (Additional training and events - Friday 16th Nov 2012)
Tickets Onsale: 27th August 2012
Save the date people and start looking for cheap flight deals!
The one and only Hacker conference in New Zealand is back for its 6th year - 17/18 November 2012
Sometimes it can be tough living in New Zealand. Sure we have great landscape and wonderful friendly people but you can never escape how damned far from EVERY WHERE we are.
Nothing makes this more apparent than the major international conference and training circuit.
For the most part, vulnerability research is a very technical, in-depth subject.
Before get into the fun "guts of it" however, there is one soft subject we must address first. That is a look at what is desirable to know / understand up front.
We call this a soft subject because like the ethics of research, there is a variety of opinions about what prerequisite knowledge is required to get started in finding vulnerabilities. Given the broad coverage of the subject, it is our opinion no one person is right.
To keep things simple, we have compiled a small list of what to focus on from ours and others experience. This is a list that is far from comprehensive or complete but should provide some guidance on whether or not you're headed in the right direction.
First things first...