Exploiting Password Weaknesses in Physical Security

Digital spin locks like the Kaba Mas X-09 and X-10 are very common for high security applications like vault doors. US General Services Administration approval means that they are nearly ubiquitous in securing government filing cabinets that contain documents that are...

PHDays CTF Quals 2014 Write-up: "turututu"

We are given a file, “task.exe,” and told that “smthg wrong with this env.”  Running `file` tells us that this is not an EXE at all: it is an x86_64 ELF.  We try to run it and quickly determine it expects a certain command-line...

PHDays CTF Quals 2014 Write-up: "miXer"

The description of the task is that the program has been stuck “in a blender.”  Upon opening the program in IDA Pro, it is clear the bytes have been modified, since there are nonsensical instructions and a large block of undecipherable bytes. It is...

PHDays CTF Quals 2014 Write-up Collection

If you know of a link we have missed, please let us know in the comments and we will add it shortly.  Thanks! Metal Gear Felix http://tasteless.se/2014/01/phd-ctf-quals-2014-rbox-and-metal-gear-felix-writeup/ mp3 me...

Security for Lawfirms: Protecting Your Clients' Secrets

Data security is paramount for any business, especially those entrusted with the intellectual property of others.  Today’s cyber threats are only growing more sophisticated, and keeping your business secure is correspondingly ever more complex. ...