Nationstate | t2 infosec conference https://t2.fi Sun, 10 Sep 2017 00:26:36 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.5 https://t2.fi/wp-content/uploads/2020/07/cropped-t2_web-icon-32x32.png Nationstate | t2 infosec conference https://t2.fi 32 32 Cosmic Duke https://t2.fi/2017/09/10/cosmic-duke/ Sun, 10 Sep 2017 00:26:36 +0000 https://t2.fi/?p=1306 In this video from t2’15 Artturi Lehtiö peers inside over 7 years of state sponsored malware operations. The presentation covers themes such as less glamorous side of APT research, tools and approaches, in addition to the challenges related to publishing this type of information. Those into offensive work can view the video as training material …

The post Cosmic Duke first appeared on t2 infosec conference.]]>
In this video from t2’15 Artturi Lehtiö peers inside over 7 years of state sponsored malware operations. The presentation covers themes such as less glamorous side of APT research, tools and approaches, in addition to the challenges related to publishing this type of information.

Those into offensive work can view the video as training material for improving tradecraft.

For additional information on the subject, here are the links for the whitepapers mentioned during the talk.

The post Cosmic Duke first appeared on t2 infosec conference.]]>
t2’15 Challenge to be released 2015-09-19 10:00 EEST https://t2.fi/2015/09/14/t215-challenge-to-be-released-2015-09-19-1000-eest/ Mon, 14 Sep 2015 05:18:48 +0000 http://t2.fi/?p=853 Last year’s crowdsourcing effort was a definite success and that inspired us to go for a crowdsourced cryptanalysis mission. Background After last year’s t2 we spent the cold winter months browsing through online auctions for historical data processing equipment. Just like LinkedIn profiles revealing sensitive projects and inside information, old devices and mass storage units …

The post t2’15 Challenge to be released 2015-09-19 10:00 EEST first appeared on t2 infosec conference.]]>
Last year’s crowdsourcing effort was a definite success and that inspired us to go for a crowdsourced cryptanalysis mission.

Background

After last year’s t2 we spent the cold winter months browsing through online auctions for historical data processing equipment. Just like LinkedIn profiles revealing sensitive projects and inside information, old devices and mass storage units can be a treasure trove for the lucky.

The mystery box we received in the mail is suspected to be a part of secure communication infrastructure between nation states. After hard work and tedious efforts, we managed to extract an executable from the device for analysis.

Details

The first person to recover all content will win a free ticket to t2’15 conference. In addition to this, the creators of the Challenge will select another winner among the next ten correct answers. The criteria for the other selection is the elegance of the answer. In short, you can win with both speed and style.

The Challenge will be released on 2015-09-19 10:00 EEST right here at t2.fi

The post t2’15 Challenge to be released 2015-09-19 10:00 EEST first appeared on t2 infosec conference.]]>