Win a place @HackFu 2021 Community Edition!

by | Dec 21, 2020 | CTFs

Hello world!
At JUMPSEC we’ve managed to get our hands on tickets to what is probably the greatest cyber security event in the calendar, HackFu!
In order to be in with a chance of winning you simply need to complete the following challenge which you can download here (the download contains all the information needed to complete the challenge):

https://drive.google.com/file/d/1WFU23lFzGtxW4U5_FPzlbM4auHSZTiGt/view?usp=sharing

The deadline for submissions is 6th January 2021, we will announce the lucky winner on 8th January 2021. You don’t need to but feel free to add a bit of detail on your submission – we love hearing about the creative ways in which people solve our challenges.
In order to be eligible to win a HackFu ticket you must be able to attend HackFu on Friday 29th January 2021 between 09:30 and 17:30 GMT (it is an online event due to the global pandemic) and you must be at least 18 years old.
If you are the lucky winner we will request a postal address from you so that you can receive your HackFu survival pack which is necessary to participate.
If you’re not eligible to win the tickets or are unable to attend then you are still very welcome to have a go at the challenge and even to submit your answers or ask us for some help if you get stuck – just let us know not to enter you into the prize draw.

You can find out more about, and buy tickets for, HackFu here:
https://chronyko.com/services/hackfu-community-edition/

Disclaimer

The information provided on this website is to be used for educational purposes only. The author is in no way responsible for any misuse of the information provided. Any actions and or activities related to the material contained within this website is solely your responsibility.

GitHub Activity

 

Follow JUMPSECLabs

Disclaimer

The information provided on this website is to be used for educational purposes only. The author is in no way responsible for any misuse of the information provided. Any actions and or activities related to the material contained within this website is solely your responsibility.

You may also like…

Detecting known DLL hijacking and named pipe token impersonation attacks with Sysmon

Recently we posted a bunch of advisories relating to Ivanti Unified Endpoint Manager, a couple of which are for vulnerabilities which can be used to achieve local privilege escalation. We will give a brief explanation of the vulnerabilities and an example of Sysmon configuration rules to log exploitation attempts, along with the rationale behind them so you can adapt them to your existing configuration if needed.

Advisory CVE-2020-13769 – Ivanti Unified Endpoint Manager SQL injection

A number of web components in Endpoint Manager do not properly sanitize user input when executing SQL queries, leaving the application vulnerable to injection attacks towards the underlying database. On a standard installation with default options, the account used to query the database is database administrator.

Share This