[builds-list] SSCTF This weekend! Starts 7pm tonight - Team invite code inside

Andrew Pellitieri kierke at bu.edu
Fri Feb 26 17:03:21 EST 2016


Hey guys - if you're looking to CTF with 0xBU this weekend at SSCTF 7pm
tonight to 7pm Sunday I have some information for you:

First of all: get in the irc chat at #0xBU or 0xBU.slack.com to coordinate
with the other players. I am playing remote so not sure who will be in the
builds room but make sure you're in the chat if you want to exchange info.

I registered the team - this ctf requires each member to make their own
account and enter the team code to join the team, here are the steps:
1. go here and click the 'i' -> http://lab.seclover.com/

2. if you're prompted to translate page I recommend clicking options and
turning on always translate Chinese to avoid getting prompted every page
you click, the ctf has put some translations but I still recommend
translating everything. If the page doesn't auto translate you can right
click and press translate to english

3. click login - you will be prompted to create an xctf or something, just
register a new account with this team invitation code to join the team:
*17ca6caf53de95665a5444251f009e8d*

4. At 7pm check out the challenges, solve them and profit. The site even
says: "" ... whatever that means

Flag form: most flag form is SSCTF{xxx}, flag is xxx. If the flag is in
other ways, we will have separate instructions in title.

Happy hacking!

Best,
Drew Pellitieri
M.S. Computer Engineering
Boston University
pellitieri.com
kierke at bu.edu

*Email Hash: 7a2fg83s9!S7Q42#10*

On Mon, Jan 25, 2016 at 12:22 PM, AJ Trainor <linus at bu.edu> wrote:

> Thank you all for coming to our first meeting and signing up for the
> mailing list.
>
>         First and foremost, we would like to announce some motivation for
> participation in these weekly events. For many years now, BUILDS has
> been fielding a CTF team for various events. These Hack Nights are
> meant to be a recruiting/practice tool for fielding this year's team,
> and hopefully building an infrastructure to work off of for next year.
>
> * NorthSec CTF:*
> To that end, we would like to inform you all that participation in CTFs
> this year provides an opportunity to accompany BUILDS members and alums to
> one of our favorite CTFs, NorthSec which is held in person in Montreal each
> May, and provides *unlimited free beer to all participants. *Traditionally
> NorthSec acts as an end of the year celebration for the CTF team and a
> reward for a year of hard work*.*
>
> * Sharif CTF:*
> On a more urgent note, our first CTF of this semester will be Sharif
> CTF. The competition runs for 36 hours beginning
> *Friday Feb. 5th @ 1:30pm*. It is online, so we will likely be playing
> from BUILDS and
> trying to catch as much of the competition as possible. I hope to see
> you all there!
>
> * BUILDS Lockpicking Workshop:*
> If you have not yet been informed, BUILDS will be hosting a
> Lockpicking workshop this *Wednesday @ 7pm in MCS B33* (In case its
> not clear, these are physical locks which normally require a key). Toool
> (The Open Organization of Lockpickers) is bringing some of the tools
> and expertise to BU to teach beginner lockpicking. They will have pick
> sets and practice locks for use at the event, and for sale if you would
> like to take them home and keep practicing. Anyone and everyone is welcome!
>
> * This Week's Meeting:*
> We will be reviewing the shell, command line, and scripting. We will
> be learning how to do dynamic analysis and reverse engineering with
> gdb, and IDA Pro. We have a fun night prepared, with a bunch of demos
> and workshops. We will also go over last week's challenge, cmd1 @
> http://pwnable.kr.
> Please have a laptop you can follow along with to fully get the most
> out of this meeting. As a reminder our repo to see slides and any
> other notes is at: https://github.com/buhacknight/main. Be sure to
> stop by our IRC channel as well (#buhacknight on freenode).
>
>
> * This Weekend:*
> Eugene will be at BUILDS this weekend giving a tutorial on how to set
> up a hacker computer. This includes the system administration of a
> remote server, how to install tools on Linux, OSX, Windows, and
> introducing some useful utility applications. If time and interest
> exists, we will also solve/attempt old CTF challenges. This is useful
> preparation if you want to participate in a CTF. Come if you want help
> in configuring or using anything on a computer.
> *Saturday Jan. 30, BUILDS Room (MCS B26) @ 2PM.*
>
> * EC700:*
> For those of you who are having trouble getting into high-level
> classes and want to learn more about security, Professor Manuel Egele
> is teaching an awesome research-oriented Defense, Vulnerability, and
> Malware course, EC700. The class can easily be applied to a CS degree
> if you are a CS major, and its one of the best ways to gain an
> in-depth security background at BU. I highly recommend taking it if
> you have the time to dedicate as it is a unique opportunity to do
> security research at BU and learn a ton in the process.
>
> --AJ & Eugene
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cs-mailman.bu.edu/pipermail/builds-list/attachments/20160226/cbf00c79/attachment.html>


More information about the Builds-list mailing list