We interview Byron Cleary to talk about virtual honeynets, the dreamy Trey Ford joins us in studio, and we’ll talk about a whole bunch of security news!
This week we interview Gavin Millard from Tenable Network Security, put an end to the “wake up Mehreen” meme, and talk about jamming logs in our stories of the week.
Welcome to the third (and penultimate) blog post about the 2015 Defcon Qualification CTF! This is going to be a writeup of the “babyecho” level, as well as a thorough overview of format-string vulnerabilities! I really like format string vulnerabilities – they’re essentially a “read or write anywhere” primitive – so I’m excited to finally […]
This past weekend I competed in the Defcon CTF Qualifiers from the Legit Business Syndicate. In the past it’s been one of my favourite competitions, and this year was no exception! Unfortunately, I got stuck for quite a long time on a 2-point problem (“wwtw”) and spent most of my weekend on it. But I […]