Dear participants!
Please, check your wallet address and contact us via info@ructf.org or t.me/ktwzk in case your address is missing or invalid
https://docs.google.com/spreadsheets/d/13SGGLMdRh3FkZFiI6PN1dos8NC8uxIuAKdcyR69nwMU/edit?usp=sharing
Please, check your wallet address and contact us via info@ructf.org or t.me/ktwzk in case your address is missing or invalid
https://docs.google.com/spreadsheets/d/13SGGLMdRh3FkZFiI6PN1dos8NC8uxIuAKdcyR69nwMU/edit?usp=sharing
This media is not supported in your browser
VIEW IN TELEGRAM
The fastest teaser in the Wild West!
Today, 20:00 YEKT, Konstantin Konovalov, AI, Information Security.
https://www.youtube.com/watch?v=UB442py1QhM
Today, 20:00 YEKT, Konstantin Konovalov, AI, Information Security.
https://www.youtube.com/watch?v=UB442py1QhM
We are starting the prize distributing process!
1. Check the table https://docs.google.com/spreadsheets/d/13SGGLMdRh3FkZFiI6PN1dos8NC8uxIuAKdcyR69nwMU/edit?usp=sharing if you haven't, and contact us if your wallet is missing or invalid
2. We’ve sent 1💎 to every address from this table, now you need to deploy the wallet. If you used the TON Surf on mobile or web, you just need to login into Surf after transaction. If you used TON OS CLI, check the docs: https://docs.ton.dev/86757ecb2/p/94921e-multisignature-wallet-management-in-tonos-cli/t/478a51
3. After that we can check at ton.live that your wallet is deployed and we will send you the prize minus one Free TON Crystal, that you already recieved.
1. Check the table https://docs.google.com/spreadsheets/d/13SGGLMdRh3FkZFiI6PN1dos8NC8uxIuAKdcyR69nwMU/edit?usp=sharing if you haven't, and contact us if your wallet is missing or invalid
2. We’ve sent 1💎 to every address from this table, now you need to deploy the wallet. If you used the TON Surf on mobile or web, you just need to login into Surf after transaction. If you used TON OS CLI, check the docs: https://docs.ton.dev/86757ecb2/p/94921e-multisignature-wallet-management-in-tonos-cli/t/478a51
3. After that we can check at ton.live that your wallet is deployed and we will send you the prize minus one Free TON Crystal, that you already recieved.
Media is too big
VIEW IN TELEGRAM
Hi! This is G@l9. Tomorrow he will tell us about Intel ME. Nothing special, just some useful information.
As usual, 20:00YEKT. The 1st of April.
https://www.youtube.com/watch?v=wo8l515TQPA
As usual, 20:00YEKT. The 1st of April.
https://www.youtube.com/watch?v=wo8l515TQPA
Media is too big
VIEW IN TELEGRAM
Next video of the RuCTFE Conf will be tomorrow! Alexei Gladkikh and his talk about multi-architecture hardware emulation software Kopycat. It can emulate various processors, such as x86, ARM, MIPS and microcontrollers. Alexei will not only tell about it, but also show how it works and emulates ELFs independent from the system.
The 12th of April, 20:00YEKT (UTC+5), on our YouTube
https://www.youtube.com/c/HackerDom/
The 12th of April, 20:00YEKT (UTC+5), on our YouTube
https://www.youtube.com/c/HackerDom/
Media is too big
VIEW IN TELEGRAM
We sure use locks and doors on a daily basis. But have you ever questioned its reliability? How can it defend us or our property?
Nipnull, our next speaker, will talk about history of locks and lockpicking, types of locks, why any lock can be unlocked, and how to live with all of that.
Tomorrow, the 22nd of April, at 20:00YEKT (UTC+5)
Don’t miss the premiere on Russian: https://www.youtube.com/watch?v=BBnhZnQkuA0 (English subs will be available later)
Nipnull, our next speaker, will talk about history of locks and lockpicking, types of locks, why any lock can be unlocked, and how to live with all of that.
Tomorrow, the 22nd of April, at 20:00YEKT (UTC+5)
Don’t miss the premiere on Russian: https://www.youtube.com/watch?v=BBnhZnQkuA0 (English subs will be available later)
We have the bonus for the previous talk!
nipnull gave us some theory and now it’s time for practice — here comes the lockpick workshop with locks breaking.
Tomorrow, 29th of April, at 20:00YEKT
https://www.youtube.com/watch?v=aN6FrMHeWO4
(English subs for both videos will be avaliable a little bit later)
nipnull gave us some theory and now it’s time for practice — here comes the lockpick workshop with locks breaking.
Tomorrow, 29th of April, at 20:00YEKT
https://www.youtube.com/watch?v=aN6FrMHeWO4
(English subs for both videos will be avaliable a little bit later)
Media is too big
VIEW IN TELEGRAM
The last talk of the RuCTFE Conf 2020!
Zen will talk about reverse engineering on hardware, and will show one of a possible approach to start learning to reverse engineer stuff.
The 2nd of May, 20:00 YEKT
https://youtu.be/8fLU-FcH88M
(English subs will be avaliable a little bit later)
Zen will talk about reverse engineering on hardware, and will show one of a possible approach to start learning to reverse engineer stuff.
The 2nd of May, 20:00 YEKT
https://youtu.be/8fLU-FcH88M
(English subs will be avaliable a little bit later)
Good news, everyone!
📹 We've finally published all talks from RuCTFE Conf 2020
Here they are, in the playlist. There are nine talks (and a workshop) - from lockpicking and soldering iron reversing to application of AI in information security and defence in mobile games. Each speaker can be asked any question in the comments — almost like on a real conference, just not that synchronized :)
English subnoscripts for a few last videos will be published later in May, we'll remind you about it once more.
📹 We've finally published all talks from RuCTFE Conf 2020
Here they are, in the playlist. There are nine talks (and a workshop) - from lockpicking and soldering iron reversing to application of AI in information security and defence in mobile games. Each speaker can be asked any question in the comments — almost like on a real conference, just not that synchronized :)
English subnoscripts for a few last videos will be published later in May, we'll remind you about it once more.
😮 RuCTFE 2020 isn't over yet
We had an idea of having competitions not only by using special-wrtitten serveces.
So together with SKB Kontur we're launching a Month of Real Product Vulnerability Survey. Prize fund — 200 000 ₽ and an invitation to RuCTF 2021.
How it works: search for vulnerabilities in products of Kontur and send reports into the special form. Don't forget to identify your team in the vulnerability denoscription. Starting now, we are taking your reports until June 4. Then, we are going to sum things up and divide 200 000 ₽ among three teams and invite one team to RuCTF 2021.
Please, don’t forget to read the full rules: https://kontur-inc.com/bugbounty/ructfe
We had an idea of having competitions not only by using special-wrtitten serveces.
So together with SKB Kontur we're launching a Month of Real Product Vulnerability Survey. Prize fund — 200 000 ₽ and an invitation to RuCTF 2021.
How it works: search for vulnerabilities in products of Kontur and send reports into the special form. Don't forget to identify your team in the vulnerability denoscription. Starting now, we are taking your reports until June 4. Then, we are going to sum things up and divide 200 000 ₽ among three teams and invite one team to RuCTF 2021.
Please, don’t forget to read the full rules: https://kontur-inc.com/bugbounty/ructfe
🏴☠️RuCTF 2021 is going to take place on July 18
This year we're making an online-competition for top-25 student teams from RuCTFE 2020 and RuCTFE 2019 (25 teams from each one). We're still in process of sending invitations, however, we already can tell: in 2020 on the 25th place among all the student teams was team SFT0, and in year 2019 it was RedRocket. If you are placed above these teams — you're welcome to RuCTF, and we'll contact you soon. Otherwise, you still have a chance :)
We will post more info on RuCTF on our @RuCTF_en channel, stay tuned!
This year we're making an online-competition for top-25 student teams from RuCTFE 2020 and RuCTFE 2019 (25 teams from each one). We're still in process of sending invitations, however, we already can tell: in 2020 on the 25th place among all the student teams was team SFT0, and in year 2019 it was RedRocket. If you are placed above these teams — you're welcome to RuCTF, and we'll contact you soon. Otherwise, you still have a chance :)
We will post more info on RuCTF on our @RuCTF_en channel, stay tuned!
RuCTFE [DEPRECATED] pinned «😮 RuCTFE 2020 isn't over yet We had an idea of having competitions not only by using special-wrtitten serveces. So together with SKB Kontur we're launching a Month of Real Product Vulnerability Survey. Prize fund — 200 000 ₽ and an invitation to RuCTF 2021.…»
We would like to congratulate our partners — @TONCRYSTAL with Free TON 1 Anniversary 💎
Thank them for fruitful cooperation and great support of RuCTFE!
Remember, any of you can always join Free TON community, e.g. as a developer of smart-contracts or a security researcher! More details and docs are here: https://ton.dev/ and https://new.freeton.org
Thank them for fruitful cooperation and great support of RuCTFE!
Remember, any of you can always join Free TON community, e.g. as a developer of smart-contracts or a security researcher! More details and docs are here: https://ton.dev/ and https://new.freeton.org
Hi everyone!
We're here to tell you about searching-vulnerabilities-in-real-products Month.
The first team has already collected 40 points — it was SFT0 team who was already invited to RuCTF. Though they will receive the money prize :) However, you still can beat them — we are taking your reports 'til June 4 at https://kontur-inc.com/bugbounty/ructfe
One more thing — from now on, you can get accounts for free authentication in products, so that you could search for vulnerabilities inside of them. Just mail security@skbkontur.ru, ask them about receiving logins and passwords and don't forget to identify your team in the letter!
We're here to tell you about searching-vulnerabilities-in-real-products Month.
The first team has already collected 40 points — it was SFT0 team who was already invited to RuCTF. Though they will receive the money prize :) However, you still can beat them — we are taking your reports 'til June 4 at https://kontur-inc.com/bugbounty/ructfe
One more thing — from now on, you can get accounts for free authentication in products, so that you could search for vulnerabilities inside of them. Just mail security@skbkontur.ru, ask them about receiving logins and passwords and don't forget to identify your team in the letter!
SKB Kontur
Vulnerability search program
It’s been half a month since we together with Kontur started the searching-vulnerabilities-in-real-products Month. We’ll be taking reports for another two weeks. The first and only team on the scoreboard is SFT0 with two reports.
Just reminding you, that the prize fund is 200,000₽ and an invitation to RuCTF 2021. SFT0 is already invited, so even if you send a low priority vulnerability, you could still receive around 50,000₽ and a chance to participate in RuCTF 2021! By the way, you can research products from the inside as well — Kontur will provide accounts for that.
For more details and rules: https://kontur-inc.com/bugbounty/ructfe
Just reminding you, that the prize fund is 200,000₽ and an invitation to RuCTF 2021. SFT0 is already invited, so even if you send a low priority vulnerability, you could still receive around 50,000₽ and a chance to participate in RuCTF 2021! By the way, you can research products from the inside as well — Kontur will provide accounts for that.
For more details and rules: https://kontur-inc.com/bugbounty/ructfe
SKB Kontur
Vulnerability search program
ZeroNights Hack Quest starts right now!
Every day, there is going to be a task, and the first person to send a flag and make write-up would receive an invitation to ZeroNights.
The first task was made by us, Hackerdom team. Good luck!
https://hackquest.zeronights.org/
Every day, there is going to be a task, and the first person to send a flag and make write-up would receive an invitation to ZeroNights.
The first task was made by us, Hackerdom team. Good luck!
https://hackquest.zeronights.org/
ZeroNights Hack Quest goes on!
Congrats to beched with completion of the first task! And here is the second one from us (the fourth task in summary).
This time it's the task from Arthur awengar from RuCTFE team. Don't miss the opportunity to take your place in the hall of fame and to receive your invitation to ZeroNights: https://hackquest.zeronights.org
Congrats to beched with completion of the first task! And here is the second one from us (the fourth task in summary).
This time it's the task from Arthur awengar from RuCTFE team. Don't miss the opportunity to take your place in the hall of fame and to receive your invitation to ZeroNights: https://hackquest.zeronights.org
hackquest.zeronights.org
ZeroNights 2025 / HackQuest
Annual ZeroNights hacking challenge
Searching-Vulnerabilities-In-Real-Products Month ends today, however, we only have one winner - team SFT0, who will get 100 thousand rubles and the invitation of their second team (if they had one) to RuCTF 2021. Congrats!
Actually, we think it's unfair not to give away all the presents, so guys from @Konturtech suggested making the contest last for a little bit more — for two more weeks!
Send us your reports until July 18. Remember, even if you send a low priority vulnerability, you could still collect your prize: https://kontur-inc.com/bugbounty/ructfe
(try beating SFT0 and getting 100k rubles)
Actually, we think it's unfair not to give away all the presents, so guys from @Konturtech suggested making the contest last for a little bit more — for two more weeks!
Send us your reports until July 18. Remember, even if you send a low priority vulnerability, you could still collect your prize: https://kontur-inc.com/bugbounty/ructfe
(try beating SFT0 and getting 100k rubles)
SKB Kontur
Vulnerability search program
Searching-Vulnerabilities-In-Real-Products Month organized by Kontur was long enough, yet it's over now!
We got some more reports, but unfortunately, there weren't any successful ones.
So we congratulate team SFT0 from Moscow - these guys are getting 100 000 ₽ from Kontur and are now able to participate in RuCTF 2021 with both of their teams of 7 people each!
By the way, the Bug bounty program is always there (though they don't give away RuCTF invitations anymore) — https://kontur-inc.com/bugbounty
We got some more reports, but unfortunately, there weren't any successful ones.
So we congratulate team SFT0 from Moscow - these guys are getting 100 000 ₽ from Kontur and are now able to participate in RuCTF 2021 with both of their teams of 7 people each!
By the way, the Bug bounty program is always there (though they don't give away RuCTF invitations anymore) — https://kontur-inc.com/bugbounty
SKB Kontur
Vulnerability search program
Forwarded from RuCTF in english [DEPRECATED] (Вик Котвицкий)
Hello everyone!
Unfortunately, we must reschedule RuCTF.
A part of the development team got infected with COVID, and now they're staying home and are not able to finish services for the game.
And we are not able to host RuCTF without services. We also don't want to let down our developers and teams, who wanted to come in Yekaterinburg, so we are moving RuCTF to the second half of August.
Unfortunately, we must reschedule RuCTF.
A part of the development team got infected with COVID, and now they're staying home and are not able to finish services for the game.
And we are not able to host RuCTF without services. We also don't want to let down our developers and teams, who wanted to come in Yekaterinburg, so we are moving RuCTF to the second half of August.
Hey there!
Our friends from We_0wn_Y0u are running an academic workshop co-located with DeepSec 2021 November 18/19, Vienna.
Their CfP is open until August 20. (7 days left!). If you have something to tell at a conference on practical IT security - it's time!
More information here.
Our friends from We_0wn_Y0u are running an academic workshop co-located with DeepSec 2021 November 18/19, Vienna.
Their CfP is open until August 20. (7 days left!). If you have something to tell at a conference on practical IT security - it's time!
More information here.