-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
4 changed files
with
23 additions
and
5 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
--- | ||
layout: post | ||
title: Cyber security challenge | ||
--- | ||
|
||
<p class="image"><img src="https://lh6.googleusercontent.com/-mtDjHNB9WRo/U4lB5sP_D1I/AAAAAAAABCo/0m0r_WtSqWo/w850/cysca-rankings.png" /></p> | ||
|
||
This year I took part in [CySCA 2014](https://cyberchallenge.com.au/) - a 24-hour computer security competition for uni and TAFE students across Australia. The competition consisted of 'capturing flags' (completing challenges) in a simulated environment, involving tasks such as reverse-engineering programs, network forensics, cryptography and more. | ||
|
||
Even though most of my team didn't last the full 24-hours, we still managed to score 33rd place! | ||
|
||
<p class="image"><img src="https://lh5.googleusercontent.com/-PlSuoALxaxg/U4lB9nzRiEI/AAAAAAAABC4/m8OnWFZ56yM/w850/cysca-challenges.png" /></p> | ||
|
||
One particularly interesting task involved me having to recreate and uncompress a disk volume from captured network traffic (using [Wireshark](http://www.wireshark.org/about.html)), mounting it and restoring deleted files (using [Sleuthkit](http://www.sleuthkit.org/sleuthkit/index.php)). | ||
|
||
I didn't end up solving that challenge, but I did come across a tongue-in-cheek easter egg image stating: _"Nope. Not here"_. Although slightly demotivating, I've got to appreciate the level of detail they went into creating these challenges haha. Can't wait till next year! | ||
|
||
<p class="image"><img src="https://lh5.googleusercontent.com/-mZtNTeKbz_M/U4lMVj7gaWI/AAAAAAAABD4/V8TeA9OQ4Kw/w850/Screenshot.png" /></p> |