Hacker Contest Challenge of Summer Semester 2024: Sample Solution online

14. June 2024

This summer semester, the "Hacker Contest" will be taking place again at the Technical University (TU) Darmstadt and Darmstadt University of Applied Sciences (h_da). In this popular course, students gain practical insights into IT security and gain hands-on experience with tools and methods for discovering vulnerabilities in networks and systems in the usd HeroLab's PentestLab.

Every semester, interested students have to take part in the Hacker Contest Challenge in order to qualify for participation. This time, the challenge was to execute a forensic analysis of a hard drive. The participants had to provide an overview of the attacker's exact approach and recommend measures for securing the system in their solution.

Experts from the usd HeroLab have published the task and a sample solution for the challenge in their LabNews. If you would like to know what the Hacker Contest Challenge for the summer semester 2024 looked like and what you might have missed:

Also interesting:

DORA Countdown: One Month Left Until the Deadline

DORA Countdown: One Month Left Until the Deadline

DORA, the Digital Operational Resilience Act, will fully apply as of 17 January 2025. We have summarized everything you need to know about the EU regulation, preparation and best practices from our news blog.

Sunset of PCI DSS v4.0 on 31 December 2024: Get Ready!

Sunset of PCI DSS v4.0 on 31 December 2024: Get Ready!

PCI DSS v4.0: In March 2024, version 4.0 of the Payment Card Industry Data Security Standard became mandatory after a two-year transition phase. Just a few months later, version 4.0.1 was released as a minor update of the standard, which will become mandatory on...

Top 3 Vulnerabilities in SSO Pentests

Top 3 Vulnerabilities in SSO Pentests

During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant risks to corporate security. They increasingly encounter the same vulnerabilities. Our blog series "Top 3 Vulnerabilities" presents...

Categories

Categories