Media is too big
VIEW IN TELEGRAM
Meet Demid — our next speaker! Tomorrow he is going to explain you some basics of hardware research.
Enable notifications to not miss the premiere and watch the talk on January the 28th at 20:00YEKT (UTC+5)
https://www.youtube.com/watch?v=pM3TOAT7fTQ
Don't forget to leave your questions and comments in the chat!
Enable notifications to not miss the premiere and watch the talk on January the 28th at 20:00YEKT (UTC+5)
https://www.youtube.com/watch?v=pM3TOAT7fTQ
Don't forget to leave your questions and comments in the chat!
Let's watch the talk about hardware reverse with soldering iron. In 10 minutes at our YouTube! Remeber to turn on captions and feel free to ask any questions in the chat https://www.youtube.com/watch?v=pM3TOAT7fTQ
Media is too big
VIEW IN TELEGRAM
Do not miss the talk of our new guest tomorrow!
Asya Gorelina and mobile gaming security, February the 13th at 20:00YEKT.
https://www.youtube.com/watch?v=1rWyApixd2s
Asya Gorelina and mobile gaming security, February the 13th at 20:00YEKT.
https://www.youtube.com/watch?v=1rWyApixd2s
Media is too big
VIEW IN TELEGRAM
RuCTFE Conf is back!
Meet Alexey Morozov from Rambler Group and his talk about misconfigurations in the developer infrastructure. He will tell you about tricky nuances in GitLab, Jira, Confluence and another products that developers use everyday.
Tomorrow, the 13th of March, at 20:00YEKT
https://www.youtube.com/watch?v=34N27LPiQvk
Meet Alexey Morozov from Rambler Group and his talk about misconfigurations in the developer infrastructure. He will tell you about tricky nuances in GitLab, Jira, Confluence and another products that developers use everyday.
Tomorrow, the 13th of March, at 20:00YEKT
https://www.youtube.com/watch?v=34N27LPiQvk
Dear participants!
Please, check your wallet address and contact us via info@ructf.org or t.me/ktwzk in case your address is missing or invalid
https://docs.google.com/spreadsheets/d/13SGGLMdRh3FkZFiI6PN1dos8NC8uxIuAKdcyR69nwMU/edit?usp=sharing
Please, check your wallet address and contact us via info@ructf.org or t.me/ktwzk in case your address is missing or invalid
https://docs.google.com/spreadsheets/d/13SGGLMdRh3FkZFiI6PN1dos8NC8uxIuAKdcyR69nwMU/edit?usp=sharing
This media is not supported in your browser
VIEW IN TELEGRAM
The fastest teaser in the Wild West!
Today, 20:00 YEKT, Konstantin Konovalov, AI, Information Security.
https://www.youtube.com/watch?v=UB442py1QhM
Today, 20:00 YEKT, Konstantin Konovalov, AI, Information Security.
https://www.youtube.com/watch?v=UB442py1QhM
We are starting the prize distributing process!
1. Check the table https://docs.google.com/spreadsheets/d/13SGGLMdRh3FkZFiI6PN1dos8NC8uxIuAKdcyR69nwMU/edit?usp=sharing if you haven't, and contact us if your wallet is missing or invalid
2. We’ve sent 1💎 to every address from this table, now you need to deploy the wallet. If you used the TON Surf on mobile or web, you just need to login into Surf after transaction. If you used TON OS CLI, check the docs: https://docs.ton.dev/86757ecb2/p/94921e-multisignature-wallet-management-in-tonos-cli/t/478a51
3. After that we can check at ton.live that your wallet is deployed and we will send you the prize minus one Free TON Crystal, that you already recieved.
1. Check the table https://docs.google.com/spreadsheets/d/13SGGLMdRh3FkZFiI6PN1dos8NC8uxIuAKdcyR69nwMU/edit?usp=sharing if you haven't, and contact us if your wallet is missing or invalid
2. We’ve sent 1💎 to every address from this table, now you need to deploy the wallet. If you used the TON Surf on mobile or web, you just need to login into Surf after transaction. If you used TON OS CLI, check the docs: https://docs.ton.dev/86757ecb2/p/94921e-multisignature-wallet-management-in-tonos-cli/t/478a51
3. After that we can check at ton.live that your wallet is deployed and we will send you the prize minus one Free TON Crystal, that you already recieved.
Media is too big
VIEW IN TELEGRAM
Hi! This is G@l9. Tomorrow he will tell us about Intel ME. Nothing special, just some useful information.
As usual, 20:00YEKT. The 1st of April.
https://www.youtube.com/watch?v=wo8l515TQPA
As usual, 20:00YEKT. The 1st of April.
https://www.youtube.com/watch?v=wo8l515TQPA
Media is too big
VIEW IN TELEGRAM
Next video of the RuCTFE Conf will be tomorrow! Alexei Gladkikh and his talk about multi-architecture hardware emulation software Kopycat. It can emulate various processors, such as x86, ARM, MIPS and microcontrollers. Alexei will not only tell about it, but also show how it works and emulates ELFs independent from the system.
The 12th of April, 20:00YEKT (UTC+5), on our YouTube
https://www.youtube.com/c/HackerDom/
The 12th of April, 20:00YEKT (UTC+5), on our YouTube
https://www.youtube.com/c/HackerDom/
Media is too big
VIEW IN TELEGRAM
We sure use locks and doors on a daily basis. But have you ever questioned its reliability? How can it defend us or our property?
Nipnull, our next speaker, will talk about history of locks and lockpicking, types of locks, why any lock can be unlocked, and how to live with all of that.
Tomorrow, the 22nd of April, at 20:00YEKT (UTC+5)
Don’t miss the premiere on Russian: https://www.youtube.com/watch?v=BBnhZnQkuA0 (English subs will be available later)
Nipnull, our next speaker, will talk about history of locks and lockpicking, types of locks, why any lock can be unlocked, and how to live with all of that.
Tomorrow, the 22nd of April, at 20:00YEKT (UTC+5)
Don’t miss the premiere on Russian: https://www.youtube.com/watch?v=BBnhZnQkuA0 (English subs will be available later)
We have the bonus for the previous talk!
nipnull gave us some theory and now it’s time for practice — here comes the lockpick workshop with locks breaking.
Tomorrow, 29th of April, at 20:00YEKT
https://www.youtube.com/watch?v=aN6FrMHeWO4
(English subs for both videos will be avaliable a little bit later)
nipnull gave us some theory and now it’s time for practice — here comes the lockpick workshop with locks breaking.
Tomorrow, 29th of April, at 20:00YEKT
https://www.youtube.com/watch?v=aN6FrMHeWO4
(English subs for both videos will be avaliable a little bit later)
Media is too big
VIEW IN TELEGRAM
The last talk of the RuCTFE Conf 2020!
Zen will talk about reverse engineering on hardware, and will show one of a possible approach to start learning to reverse engineer stuff.
The 2nd of May, 20:00 YEKT
https://youtu.be/8fLU-FcH88M
(English subs will be avaliable a little bit later)
Zen will talk about reverse engineering on hardware, and will show one of a possible approach to start learning to reverse engineer stuff.
The 2nd of May, 20:00 YEKT
https://youtu.be/8fLU-FcH88M
(English subs will be avaliable a little bit later)
Good news, everyone!
📹 We've finally published all talks from RuCTFE Conf 2020
Here they are, in the playlist. There are nine talks (and a workshop) - from lockpicking and soldering iron reversing to application of AI in information security and defence in mobile games. Each speaker can be asked any question in the comments — almost like on a real conference, just not that synchronized :)
English subnoscripts for a few last videos will be published later in May, we'll remind you about it once more.
📹 We've finally published all talks from RuCTFE Conf 2020
Here they are, in the playlist. There are nine talks (and a workshop) - from lockpicking and soldering iron reversing to application of AI in information security and defence in mobile games. Each speaker can be asked any question in the comments — almost like on a real conference, just not that synchronized :)
English subnoscripts for a few last videos will be published later in May, we'll remind you about it once more.
😮 RuCTFE 2020 isn't over yet
We had an idea of having competitions not only by using special-wrtitten serveces.
So together with SKB Kontur we're launching a Month of Real Product Vulnerability Survey. Prize fund — 200 000 ₽ and an invitation to RuCTF 2021.
How it works: search for vulnerabilities in products of Kontur and send reports into the special form. Don't forget to identify your team in the vulnerability denoscription. Starting now, we are taking your reports until June 4. Then, we are going to sum things up and divide 200 000 ₽ among three teams and invite one team to RuCTF 2021.
Please, don’t forget to read the full rules: https://kontur-inc.com/bugbounty/ructfe
We had an idea of having competitions not only by using special-wrtitten serveces.
So together with SKB Kontur we're launching a Month of Real Product Vulnerability Survey. Prize fund — 200 000 ₽ and an invitation to RuCTF 2021.
How it works: search for vulnerabilities in products of Kontur and send reports into the special form. Don't forget to identify your team in the vulnerability denoscription. Starting now, we are taking your reports until June 4. Then, we are going to sum things up and divide 200 000 ₽ among three teams and invite one team to RuCTF 2021.
Please, don’t forget to read the full rules: https://kontur-inc.com/bugbounty/ructfe
🏴☠️RuCTF 2021 is going to take place on July 18
This year we're making an online-competition for top-25 student teams from RuCTFE 2020 and RuCTFE 2019 (25 teams from each one). We're still in process of sending invitations, however, we already can tell: in 2020 on the 25th place among all the student teams was team SFT0, and in year 2019 it was RedRocket. If you are placed above these teams — you're welcome to RuCTF, and we'll contact you soon. Otherwise, you still have a chance :)
We will post more info on RuCTF on our @RuCTF_en channel, stay tuned!
This year we're making an online-competition for top-25 student teams from RuCTFE 2020 and RuCTFE 2019 (25 teams from each one). We're still in process of sending invitations, however, we already can tell: in 2020 on the 25th place among all the student teams was team SFT0, and in year 2019 it was RedRocket. If you are placed above these teams — you're welcome to RuCTF, and we'll contact you soon. Otherwise, you still have a chance :)
We will post more info on RuCTF on our @RuCTF_en channel, stay tuned!
RuCTFE [DEPRECATED] pinned «😮 RuCTFE 2020 isn't over yet We had an idea of having competitions not only by using special-wrtitten serveces. So together with SKB Kontur we're launching a Month of Real Product Vulnerability Survey. Prize fund — 200 000 ₽ and an invitation to RuCTF 2021.…»
We would like to congratulate our partners — @TONCRYSTAL with Free TON 1 Anniversary 💎
Thank them for fruitful cooperation and great support of RuCTFE!
Remember, any of you can always join Free TON community, e.g. as a developer of smart-contracts or a security researcher! More details and docs are here: https://ton.dev/ and https://new.freeton.org
Thank them for fruitful cooperation and great support of RuCTFE!
Remember, any of you can always join Free TON community, e.g. as a developer of smart-contracts or a security researcher! More details and docs are here: https://ton.dev/ and https://new.freeton.org
Hi everyone!
We're here to tell you about searching-vulnerabilities-in-real-products Month.
The first team has already collected 40 points — it was SFT0 team who was already invited to RuCTF. Though they will receive the money prize :) However, you still can beat them — we are taking your reports 'til June 4 at https://kontur-inc.com/bugbounty/ructfe
One more thing — from now on, you can get accounts for free authentication in products, so that you could search for vulnerabilities inside of them. Just mail security@skbkontur.ru, ask them about receiving logins and passwords and don't forget to identify your team in the letter!
We're here to tell you about searching-vulnerabilities-in-real-products Month.
The first team has already collected 40 points — it was SFT0 team who was already invited to RuCTF. Though they will receive the money prize :) However, you still can beat them — we are taking your reports 'til June 4 at https://kontur-inc.com/bugbounty/ructfe
One more thing — from now on, you can get accounts for free authentication in products, so that you could search for vulnerabilities inside of them. Just mail security@skbkontur.ru, ask them about receiving logins and passwords and don't forget to identify your team in the letter!
SKB Kontur
Vulnerability search program
It’s been half a month since we together with Kontur started the searching-vulnerabilities-in-real-products Month. We’ll be taking reports for another two weeks. The first and only team on the scoreboard is SFT0 with two reports.
Just reminding you, that the prize fund is 200,000₽ and an invitation to RuCTF 2021. SFT0 is already invited, so even if you send a low priority vulnerability, you could still receive around 50,000₽ and a chance to participate in RuCTF 2021! By the way, you can research products from the inside as well — Kontur will provide accounts for that.
For more details and rules: https://kontur-inc.com/bugbounty/ructfe
Just reminding you, that the prize fund is 200,000₽ and an invitation to RuCTF 2021. SFT0 is already invited, so even if you send a low priority vulnerability, you could still receive around 50,000₽ and a chance to participate in RuCTF 2021! By the way, you can research products from the inside as well — Kontur will provide accounts for that.
For more details and rules: https://kontur-inc.com/bugbounty/ructfe
SKB Kontur
Vulnerability search program
ZeroNights Hack Quest starts right now!
Every day, there is going to be a task, and the first person to send a flag and make write-up would receive an invitation to ZeroNights.
The first task was made by us, Hackerdom team. Good luck!
https://hackquest.zeronights.org/
Every day, there is going to be a task, and the first person to send a flag and make write-up would receive an invitation to ZeroNights.
The first task was made by us, Hackerdom team. Good luck!
https://hackquest.zeronights.org/
ZeroNights Hack Quest goes on!
Congrats to beched with completion of the first task! And here is the second one from us (the fourth task in summary).
This time it's the task from Arthur awengar from RuCTFE team. Don't miss the opportunity to take your place in the hall of fame and to receive your invitation to ZeroNights: https://hackquest.zeronights.org
Congrats to beched with completion of the first task! And here is the second one from us (the fourth task in summary).
This time it's the task from Arthur awengar from RuCTFE team. Don't miss the opportunity to take your place in the hall of fame and to receive your invitation to ZeroNights: https://hackquest.zeronights.org
hackquest.zeronights.org
ZeroNights 2025 / HackQuest
Annual ZeroNights hacking challenge