First Blood CTF – Rules
We publish this information to clarify some of the aspects of the competition for the members eager to find out more. Some aspects of this document will change until the first CTF is online. However,...
View ArticleCTF365 – Beta Public Live
We have received lots of CTF365 Beta Access requests and because of that, CTF365 took another step forward. Starting today, we’re opening the Bronze Account for anyone who wants to train, learn and...
View ArticleHacker’s Dome – First Blood | The Machines
First of all, I would like to thank you all for the great support you showed us during the competition. This motivates us for developing Hacker’s Dome even further. We learned a lot during this first...
View ArticleIntroducing Student Security Training Program
This article is for information security and network security teachers, students who want to become security professionals or system administrators, and university representatives whose university...
View ArticleHacker’s Dome – First Blood | The Official Writeup
I’ll try to keep this information to a minimum for better readability. The setup was replicated over a local network for faster access. ctf01-01, IP address: 10.200.0.4 Enumeration: nmap -sS -p 1-65535...
View ArticleHacker’s Dome – Double Kill | FREE Access
CTF competitions are the perfect excuse to get together and hack at will. They’re also an entertaining and hands-on way to learn security. As you all know, we created Hacker’s Dome as a place for...
View ArticleWin2k8, WinXP, HacmeBank & HacmeCasino – Free Account
When you’re trying to get involved in the information security industry and become a security professional, having access to a fully functional penetration testing lab is critical. The pentest lab is...
View ArticleCTF365: Why It Rocks – Two Years Startup Journey
The concept that drives CTF365 was inspired by the Internet, guided by capture the flag (CTF) competitions, and specially crafted for the ITC industry. CTF365 provides a platform where users and teams...
View ArticleStarting Point Guide for Security Professional Wannabes
In 2014, several financial institutions and other large corporations — including Sony, Target, J.P. Morgan, Ebay and Home Depot — were hacked. These incidents prove that security breeches are not...
View ArticleDesigning Security Training Labs – Next Generation
Information security training labs are a very important component when it comes to teaching information security or showcasing awesome security software, training your customers to use said software...
View Article