This time around we are giving away books!
The contest officially starts NOW and will run until 11:59PM on 11/19. We will announce winners promptly after that.
Prizes will be awarded to 1st and 2nd place. Everyone else who scores any amount of points will be entitled to a free sticker mailed to them if they so choose.
You can submit as many times as you wish. Please do so under ONE email address. The first person to hit maximum points will win 1st place. The 2nd person to hit maximum points will be 2nd place. If no contestant hits maximum points, we will take the highest two scores, in order of submission if there is a tie.
Submit to our [email protected]urabit.com
1st place: @binarybitme, completed all 3 challenges and bonus points. Congrats!
2nd place: @zed_0xff, completed all 3 challenges and bonus points. Congrats!
Part 1: Packet Capture Analysis. (2 points)
Please download this file. What is the name of exploit kit being used in this pcap (not the verison, you may include the entire string on that line)? BONUS (1 point): What is the CVE associated with this?
Part 2: Steganography (3 points)
Please download this file. You’ll have to have the answer to part 1 in order to fully finish Part 2. The decryption key will be the main name of the exploit kit all in lower case without spaces, and without the version or anything else on that line in the file (if you email us with what you think it is and it’s close enough i’ll confirm it). Your answer should be the name of the person whose phone number isn’t like the others. BONUS (1 point): Answer the pre-recorded question by emailing us.
Part 3: Reverse Engineering (4 points)
Submit a working key and serial. BONUS (1 point): Write a working keygen with dynamic keys.
Thanks to Syngress and No Starch our winners will receive a book of their choosing! We will provide instructions to the winners.