Security through obscurity


The challenge is over.


This year you are facing a multistage Challenge. Each stage contains a hidden URL. Browse to the URL and input your email address to receive a link to the next stage. Once you have solved all stages, send a description of your solution to the email address you received in the last email.

The first person to send the solution will win a free ticket to t2´10 conference. In addition to this, the Advisory Board will select another winner among the next ten correct answers. The criteria for the other selection is the elegance of the answer. In short, you can win with both speed and style. Either way the solution email must include a detailed description of methods and tools used to solve each stage.

Rules of the Challenge

  1. Anybody (except organizers and employees of the company that made the challenge) can participate.
  2. The answer must have a detailed description of methods and tools used.
  3. It is not allowed to publish the solution on public forums before the challenge is over.
  4. It is not allowed to modify or distribute the challenge.
  5. All rights are reserved.

Filename: t210-challenge-level1.pgm
Filesize: 103 550 bytes
MD5: dbac83357895201b3ad9d68da08fe4f5


Timo Hirvonen