How does one go about creating new tools and toolchains? In “Sweet Tools O’ Mine” from t2’16 Hugo Teso shares his approach for creating an offensive toolkit, which contains both hardware and software parts. Learning by doing, when to leverage the power of existing solutions, and when to create your own are all discussed throughout …
The post Sweet Tools Oâ Mine first appeared on t2 infosec hybrid competence center.]]>How does one go about creating new tools and toolchains?
In “Sweet Tools O’ Mine” from t2’16 Hugo Teso shares his approach for creating an offensive toolkit, which contains both hardware and software parts. Learning by doing, when to leverage the power of existing solutions, and when to create your own are all discussed throughout the video.
If you are serious about offense, this is a presentation for you.
IaitÅ, a GUI for radare2 reverse engineering framework is available on GitHub.
The post Sweet Tools Oâ Mine first appeared on t2 infosec hybrid competence center.]]>Since the first event in 2004, t2 has released annual pre-conference challenges for the attendees, people interested in showcasing their skills or gaining free attendance to the event. In this video from 2016 Ludvig Strigeus and Timo Hirvonen walk through the challenge and show how it’s all done. Even if you are not into solving …
The post Solving the challenge: 2016 first appeared on t2 infosec hybrid competence center.]]>Since the first event in 2004, t2 has released annual pre-conference challenges for the attendees, people interested in showcasing their skills or gaining free attendance to the event. In this video from 2016 Ludvig Strigeus and Timo Hirvonen walk through the challenge and show how it’s all done.
Even if you are not into solving challenges you can learn how Ludde created a complete taxi meter application with built-in casino games!
If you want to learn how to apply defensive measures to protect offensive operations and your capabilities, Jacob Torrey’s “Nano-Scale Red Teaming: Making REs Cry With Device-Specific Opaque Execution” from t2’16 is the presentation to watch. The wealth of knowledge presented on how to create trusted implants via physically uncloneable functions and encrypted execution is …
The post Nano-Scale Red Teaming first appeared on t2 infosec hybrid competence center.]]>If you want to learn how to apply defensive measures to protect offensive operations and your capabilities, Jacob Torrey’s “Nano-Scale Red Teaming: Making REs Cry With Device-Specific Opaque Execution” from t2’16 is the presentation to watch.
The wealth of knowledge presented on how to create trusted implants via physically uncloneable functions and encrypted execution is not limited to just theory as Jacob and Assured Information Security, Inc have released PUFlib on GitHub.
Live long and persist!
The post Nano-Scale Red Teaming first appeared on t2 infosec hybrid competence center.]]>The first video we are releasing is the ’16 keynote “Learning the wrong lessons from Offense” by none other than Haroon Meer himself. With strong focus on getting defense right, this is the keynote to watch, regardless of whether you’re into compromises or preventing them. Enjoy!
The post Haroon Meer keynote 2016 first appeared on t2 infosec hybrid competence center.]]>The first video we are releasing is the ’16 keynote “Learning the wrong lessons from Offense” by none other than Haroon Meer himself. With strong focus on getting defense right, this is the keynote to watch, regardless of whether you’re into compromises or preventing them.
Enjoy!
The post Haroon Meer keynote 2016 first appeared on t2 infosec hybrid competence center.]]>To all those who contributed to the hybrid competence center either as an attendee or as a speaker: Thank You! If you have any questions/comments/feedback please let us know – we would love to make the con even better.
The post t2â16 is over â Thank You! first appeared on t2 infosec hybrid competence center.]]>To all those who contributed to the hybrid competence center either as an attendee or as a speaker: Thank You!
If you have any questions/comments/feedback please let us know – we would love to make the con even better.
The post t2â16 is over â Thank You! first appeared on t2 infosec hybrid competence center.]]>t2’16 is on!
The post t2â16 is on! first appeared on t2 infosec hybrid competence center.]]>t2’16 is on!
The post t2â16 is on! first appeared on t2 infosec hybrid competence center.]]>Are you very sad that your exploit leaked as a teaser for an auction in BitCoin? TESO could have told you how to protect your exploits against leaking already back in 2000. Watch and learn!
The post t2â16 Surprise Speaker Announced first appeared on t2 infosec hybrid competence center.]]>Are you very sad that your exploit leaked as a teaser for an auction in BitCoin?
TESO could have told you how to protect your exploits against leaking already back in 2000. Watch and learn!
The post t2â16 Surprise Speaker Announced first appeared on t2 infosec hybrid competence center.]]>Yeah, we know – a nerdy reference to a great book. If you’ve ever been to t2, you know that the atmosphere and networking is everything. In order to keep it that way, we have always limited the amount of attendees to 99. Usually all the seats are sold out about one month before the event takes …
The post The Three-seat Problem first appeared on t2 infosec hybrid competence center.]]>Yeah, we know – a nerdy reference to a great book.
If you’ve ever been to t2, you know that the atmosphere and networking is everything. In order to keep it that way, we have always limited the amount of attendees to 99.
Usually all the seats are sold out about one month before the event takes place and this year is not an exception. That being said, we just got three cancellations, so we have three seats left.
If you were thinking of coming but missed the party, now is your chance.
Oh, and we will soon announce our surprise speaker
Carl “Zeta Two” Svensson from Sweden was the first one to solve the t2’16 Challenge. Well done! Congratulations! The elegant write-up trophy goes to Alexander Polyakov, Russia. His write-up will be published soon so you’ll have a change to evaluate the submission yourself. Congratulations to both winners! We would also like to thank each one …
The post t2â16 Challenge winners first appeared on t2 infosec hybrid competence center.]]>Carl “Zeta Two” Svensson from Sweden was the first one to solve the t2’16 Challenge. Well done! Congratulations!
The elegant write-up trophy goes to Alexander Polyakov, Russia. His write-up will be published soon so you’ll have a change to evaluate the submission yourself.
Congratulations to both winners! We would also like to thank each one of you who participated. Last but not least. if you have an interesting idea for t2’17 Challenge, please let us know – authors get a free admission to the hybrid competence center among other perks
This is just a short note to let you know that the deadline for t2’16 Challenge write-up submissions is 2016-10-08 10:00 EEST, after which the creators of the Challenge will select the winner. Please remember that the criteria for the selection is the elegance of the answer. The solution must include a detailed description of …
Continue reading "t2’16 Challenge write-up submission deadline is 2016-10-08 10:00 EEST"
The post t2â16 Challenge write-up submission deadline is 2016-10-08 10:00 EEST first appeared on t2 infosec hybrid competence center.]]>This is just a short note to let you know that the deadline for t2’16 Challenge write-up submissions is 2016-10-08 10:00 EEST, after which the creators of the Challenge will select the winner.
Please remember that the criteria for the selection is the elegance of the answer. The solution must include a detailed description of methods and tools used. If you donât know the definition of elegance â please check out the winning write-ups from previous years.
The post t2â16 Challenge write-up submission deadline is 2016-10-08 10:00 EEST first appeared on t2 infosec hybrid competence center.]]>