Digital Operatives
  • Home
  • Blog
  • Careers
  • Contact
  • Products
  • Research
  • Services
Select Page

PHDays CTF Quals 2014 Write-up Collection

by digitaloperatives | Jan 28, 2014 | Capture the Flag

If you know of a link we have missed, please let us know in the comments and we will add it shortly.  Thanks! Metal Gear Felix http://tasteless.se/2014/01/phd-ctf-quals-2014-rbox-and-metal-gear-felix-writeup/ mp3 me...

Security for Lawfirms: Protecting Your Clients' Secrets

by digitaloperatives | Jan 24, 2014 | Services

Data security is paramount for any business, especially those entrusted with the intellectual property of others.  Today’s cyber threats are only growing more sophisticated, and keeping your business secure is correspondingly ever more complex. ...

Ghost in the Shellcode 2014 Write-up Collection

by digitaloperatives | Jan 21, 2014 | Capture the Flag

We had a great time solving a few problems from the Ghost in the Shellcode CTF this past weekend and wanted to have an easy place with links to write-ups from all around the Internet, so we created it here.  If you know of a link we have missed, please let...

Unambiguous Encapsulation: Defending Against "Packet in Packet" Attacks

by digitaloperatives | Jan 20, 2014 | Research

A couple days ago, Dominic Spill and Michael Ossman presented an interesting talk at Shmoocon on using specially crafted error correcting codes to have unambiguous encapsulation, preventing attacks like “Packet in Packet.” This appears to be the...

Ghost in the Shellcode 2014 Write-up, Choose Your Pwn Adventure 2 200: "Portal"

by digitaloperatives | Jan 19, 2014 | Capture the Flag

The video contains a second audio stream, as indicated by VLC here: The second audio stream is an SSTV stream containing image information.  We extract the stream with the following command (the same file as the download was “credits.ogv” in the...
« Older Entries
Next Entries »

Recent Posts

  • Bug Bounty: An Economic Disadvantage for Researchers?
  • The 10 Humorous But Immutable Laws of Cloud Security
  • Defeating Cisco’s Machine Learning Based Malware Traffic Detection Algorithm
  • The Cyber-Insecurity of WeWork – Shared Offices and Cracking WiFi with Weak WPA2 Passwords
  • Idea Machine – Part 1: Automated Reconnaissance For Penetration Testing

Archives

  • July 2023
  • October 2018
  • September 2018
  • May 2018
  • September 2017
  • August 2017
  • July 2017
  • April 2015
  • February 2015
  • September 2014
  • February 2014
  • January 2014
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • December 2012
  • November 2012
  • October 2012

Categories

  • Capture the Flag
  • Products
  • Research
  • Security News
  • Services
  • Uncategorized