Hacker Contest Challenge WiSe 23/24: Sample Solution online

9. November 2023

30 students from Technical University (TU) Darmstadt have qualified to attend "Hacker Contest" in the winter semester 2023/24 by successfully completing the registration challenge. In this popular event, students gain insights into IT security and get hands-on experience with tools and methods for identifying vulnerabilities in networks and systems in the usd HeroLab's PentestLab.

The Challenge

The challenge was to thoroughly examine a hard disk with an outdated operating system in order to find important tokens for a Bitcoin wallet. The participants had to complete several small tasks, each of which provided a specific character string as a "flag". There were a total of 6 flags that could be collected and submitted.

Experts from usd HeroLab have published a Write-up of the challenge for you in their LabNews. If you want to know what a Hacker Contest Challenge looks like, or what flags you might have missed: Click here for the sample solution Hacker Contest Challenge WiSe 2023/24.

Also interesting:

DORA Countdown: One Month Left Until the Deadline

DORA Countdown: One Month Left Until the Deadline

DORA, the Digital Operational Resilience Act, will fully apply as of 17 January 2025. We have summarized everything you need to know about the EU regulation, preparation and best practices from our news blog.

Sunset of PCI DSS v4.0 on 31 December 2024: Get Ready!

Sunset of PCI DSS v4.0 on 31 December 2024: Get Ready!

PCI DSS v4.0: In March 2024, version 4.0 of the Payment Card Industry Data Security Standard became mandatory after a two-year transition phase. Just a few months later, version 4.0.1 was released as a minor update of the standard, which will become mandatory on...

Top 3 Vulnerabilities in SSO Pentests

Top 3 Vulnerabilities in SSO Pentests

During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant risks to corporate security. They increasingly encounter the same vulnerabilities. Our blog series "Top 3 Vulnerabilities" presents...

Categories

Categories