An interview with Omar is available here.
I like to spend half the time at the conference to solve problems. And not only at the conference ...
In this sense, another lab from the PentestIT team came in handy at ZeroNights. Started passing the evening of the first day.
Everything was organized clearly, the tasks pleased me again, and again practiced the speed of working with the tools.
This time in the laboratory there was a task even for a network attack on a DBMS client (I immediately realized that this kind of attack was needed in this laboratory, since I was going to lay it in the upcoming CTF competition with blackjack, prizes and hackers under the auspices Informzaschity " ).
All tasks turned out to finish (not without a hint of hints) only by the end of the second day.
As a result, only three people entered the S-Lab information system, all long-time acquaintances. Probably, it is necessary to actively promote such competitions, because many people are too lazy to study and make some efforts for professional development in this area.
Omar Ganiev (Beched), I place
At the recently held ZeroNights conference, I managed to speak as a speaker and take part in two competitions: “Break me” from Kaspersky Lab and “Down and across” from PentestIT.In conclusion, we would like to express our deep gratitude to the organizers of the Digital Security event and to our participants. It was very cool to get into a friendly hacker atmosphere and get away from work and business, even for 2 days.
Since the first competition is still underway, I will write about it later, and I will tell you more about the penetration testing lab “Along and across”.
The competition, in general, was very pleasant, and it is more fun to sit on the reports, and in the evening there is something to do.
There are not so many tasks - only 10 of them, just for two days of the conference. Very pleased with the presence of the storyline - the services are interrelated and each has a hint or password from the next service.
The network scheme helps a lot - you don’t need to guess where there are still unbroken services, though this time it’s wrong with the network map –– I didn’t check that the routing from one subnet to another is already configured, so only the third place.
The content of the tasks itself is very pleasing - and brute force, and SQL injections, and XSS attacks on the bot, and the use of exploits from Metasploit, however, as a reverser, I am a little upset by the lack of buffer overflow vulnerabilities or use after free - only once I saw laboratory "Profit-2013".
In general, I advise everyone to take part in the next laboratory, as well as Profit-2013, which is currently working, which is part of the contest held by the System Administrator magazine. I would like to wish all participants patience in brute force ssh passwords, ingenuity and resourcefulness in searching for tokens and passwords on servers, as well as pleasant mood and good luck!
Victor Alyushin (AV1ct0r), III place
Source: https://habr.com/ru/post/202386/
All Articles