태터데스크 관리자

도움말
닫기
적용하기   첫페이지 만들기

태터데스크 메시지

저장하였습니다.

'T2 Challenge'에 해당되는 글 1건

  1. 2009.08.31 T2 Challenge
보안관련소식2009.08.31 12:18


http://www.t2.fi/challenge/

사용자 삽입 이미지

The purpose of the T2 Challenge is to have an opportunity to win free tickets to the upcoming conference.

The rules are simple: the first one to solve the Challenge will win a free ticket to the T2 conference. In addition to this, the Advisory Board will select another winner among the next ten correct answers. The criteria for the other selection is the elegance of the answer. In short, you can win with both speed and style :)

Important note: some anti-virus engines might warn that the Challenge files contain malware. That is not the case - all Challenge binaries downloaded from www.t2.fi are non-malicious and safe to analyze.

Hall of Fame

T2´09 Challenge Winners

  • Mr. Speed
  • Mr. Style

T2´08 Challenge Winners

  • Florent Marceau, France (first one to solve the challenge)
  • Fabrice Desclaux, France (best solution by means of technical accuracy and detail)

T2´07 Challenge Winners

  • William Whistler, United Kingdom
  • Fabrice Desclaux, France

T2´06 Challenge Winners

  • Pasi Parviainen, Finland
  • Samu Ristkari, Finland

T2´05 Challenge Winners

  • Pasi Parviainen, Finland
  • Matti Nikki, Finland

T2´09 Challenge [ type: Incident Response ]

Status

The Challenge is on!

Description

This year you’re facing a multistage Challenge. The first stage is about analyzing the network capture. The rest depends on your skill set i.e. the challenge can be solved in various ways.

Hint: sometimes time is the key.

The first person to send the solution to the correct email address will win a free ticket to T2´09 conference. In addition to this, the Advisory Board will select another winner among the next ten correct answers. The criteria for the other selection is the elegance of the answer. In short, you can win with both speed and style. Either way the solution email must include a detailed description of methods and tools used.

Rules of the Challenge

  1. Anybody (except organizers and employees of the company that made the challenge) can participate.
  2. The answer must have a detailed description of methods and tools used.
  3. It is not allowed to publish the solution on public forums before the challenge is over.
  4. It is not allowed to modify or distribute the network capture.
  5. All rights are reserved.

Filename: T209-CHALLENGE.PCAP
Filesize: 1 899 bytes
MD5: d50107540d149eff1d16588dc5a1c1a7

Author

Oliver Gruskovnjak

T2´08 Challenge [ type: Reverse Engineering ]

Status

The challenge is over.

Description

Upon execution, T208-CHALLENGE.EXE will launch a game installer. The game binary contains a hidden email address. The first person to send the solution to the correct email address will win a free ticket to T2´08 conference. In addition to this, the Advisory Board will select another winner among the next ten correct answers. The criteria for the other selection is the elegance of the answer. In short, you can win with both speed and style. Either way the solution email must include a detailed description of methods and tools used.

Rules of the Challenge

  1. Anybody (except organizers and employees of the company that made the challenge) can participate.
  2. The answer must have a detailed description of methods and tools used.
  3. It is not allowed to publish the solution on public forums.
  4. It is not allowed to modify or distribute the binary.
  5. All rights are reserved.

Filename: T208-CHALLENGE.EXE
Filesize: 2 420 611 bytes
MD5: 5a2c821924ec38d087ac09a1f3e9d8bd

Author

Nishad Herath / Novologica

T2´07 Challenge [ type: Reverse Engineering ]

Status

The challenge is over.

Description

Upon execution, T207-CHALLENGE.EXE will ask a password from the user. If the user answers with the correct password the program prints out an email address. The first person to send the solution to the correct email address will win a free ticket to T2´07 conference. The email must also include a detailed description of methods and tools used.

Rules of the Challenge

  1. Anybody (except organizers and employees of the company that made the challenge) can participate.
  2. The answer must have a detailed description of methods and tools used.
  3. It is not allowed to publish the solution on public forums.
  4. It is not allowed to modify or distribute the binary.
  5. All rights are reserved.

Filename: T207-CHALLENGE.EXE
Filesize: 241 664 bytes
MD5: 99fa37805601aaa824f9faafb692e721

Author

Kamil Leoniak / F-Secure Antivirus Research and Response Team

T2´06 Challenge [ type: Reverse Engineering ]

Status

The challenge is over.

Description

Upon execution, T206-CHALLENGE.EXE will ask a password from the user. If the user answers with the correct password the program prints out an email address. The first person to send the solution to the correct email address will win a free ticket to T2´06 conference. The email must also include detailed a description of methods and tools used.

Rules of the Challenge

  1. Anybody (except organizers and employees of the company that made the challenge) can participate.
  2. The answer must have a detailed description of methods and tools used.
  3. It is not allowed to publish the solution on public forums.
  4. It is not allowed to modify or distribute the binary.
  5. All rights are reserved.

Filename: T206-CHALLENGE.EXE
Filesize: 36 864 bytes
MD5: 2fc9b8ce2e7e2b9bcab95211b33f4736

Author

Jarkko Turkulainen / F-Secure Antivirus Research and Response Team

T2´05 Challenge [ type: Reverse Engineering ]

Status

The challenge is over.

Description

T205-CHALLENGE.EXE contains hidden message and an email address. The first person to send the hidden message to the correct email address will win a free ticket to T2´05 conference. The email must also include a detailed description of methods and tools used.

Rules of the Challenge

  1. Anybody (except organizers and employees of the company that made the challenge) can participate but you can only win a free ticket to T2´05 if you live in Finland.
  2. The answer must have a detailed description of methods and tools used.
  3. It is not allowed to publish the solution on public forums.
  4. It is not allowed to modify or distribute the binary.
  5. All rights are reserved.

Filename: T205-CHALLENGE.EXE
Filesize: 28 160 bytes
MD5: bf5eff788e98056a3ed299ca836a3721

Authors

Jarkko Turkulainen / F-Secure Antivirus Research and Response Team
Gergely Erdélyi / F-Secure Antivirus Research and Response Team

History

The T2 Challenge was first introduced back in 2005 and it received a huge response - T205-CHALLENGE.EXE was downloaded more than 10,000 times during the first 24 hours! The T2´05 Challenge was a reverse engineering challenge, where the task was to find a hidden message and an email address inside the executable.





Posted by viruslab