This is just a short note to let you know that the deadline for t2’15 Challenge write-up submissions is 2015-10-17 10:00 EEST, after which the creators of the Challenge will select the winner.
Please remember that the criteria for the selection is the elegance of the answer. The solution must include a detailed description of methods and tools used. If you don’t know the definition of elegance – please check out the winning write-ups from previous years.
Three and half weeks until t2’15. We’re sold out but we didn’t sell out. The hard limit of 99 attendees is the corner stone of the conference and come hell or high water, it’s here to stay.
It’s also the reason we think now is a good time to remind those who plan on attending t2’16 to sneak those figures into next year’s budget. After that, it’s just a case of “We had this discussion last October” and “Our training budget accounts for t2, lobby bar and/or random 0day”. Some of the more veteran attendees have taken this a step further and just labeled the cost as threat intel. After all, it’s the one budget category where you can pour in money and nobody questions the spending or the results.
Speaking of money, we’d like to see Lester Freamon’s take on attribution when it comes to those annoyingly pedestrian toolkits.
t2’15 Challenge hint #4: If you failed to read the recipe …
t2’15 Challenge hint #3: What file format was invented on the date contained in the missile system decryptor?
t2’15 Challenge hint #2: If you modify the cookie you will notice that it contains padding.
t2’15 Challenge hint #1: One flag is unintentionally a little bit unclear. If you find a password on a level, its hash is the solution to the level.
Some of us are young/old enough to have spent too much time browsing through Cryptome archives in the late 90s and being amazed by documents about ECHELON and TEMPEST. Yet, it only took a couple of decades to see those unravel before our very eyes.
Compared to many other security topics, open source information available on electromagnetic intelligence cannot be described as extensive nor comprehensive. Luckily, the talented researchers from Tel Aviv took public research to a new level by demonstrating their 300 USD pita bread.
The setup brings practical attacks to class rooms and coffee shops near you. This time paper and pencil are recommended for taking notes.
If you’ve ever been to t2, you know that the atmosphere and networking is everything. In order to keep it that way, we have to limit the amount of attendees, meaning there is a total of 99 seats available, including speakers and organizers.
Although there is still plenty of time before the conference takes place we have passed the 90% mark and if you want to make sure you’ll actually have a seat, we advice you to register now.
Don’t have the right skillset for the challenge? No worries, you can still follow the contestants via (near) real time scoreboard!
t2’15 Challenge is on! Good luck!