Your SlideShare is downloading. ×
Ctf online idsecconf2012 walkthrough
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Ctf online idsecconf2012 walkthrough

1,105

Published on

CTF online #idsecconf2012 - 8th level walkthorugh by uhuy http://2012.idsecconf.org/p/ctf.html

CTF online #idsecconf2012 - 8th level walkthorugh by uhuy http://2012.idsecconf.org/p/ctf.html

Published in: Technology, Business
1 Comment
0 Likes
Statistics
Notes
  • pertamax
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Views
Total Views
1,105
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
185
Comments
1
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Online CTF idsecconfWalkthroughAhmad Maulana <hmadrwx@gmail.com>
  • 2. CTF?CTF IDSECCONF  atau Capture The Flag adalah salah satu permainan simulasi hacking yang diadakan tiap tahun berbarengan dengan diadakannya kegiatan IDSECCONF.CTF ini dilakukan secara online, siapapun bisa menjadi pesertanya dengan cukup melakukan registrasi via web. Untuk CTF online tahun 2012 beralamat di http://ctf.2012.idsecconf.org dikuti oleh lebih kurang 250 peserta yang valid (divalidasi via email) dan dilaksanakan selama 11 Hari (26 April 2012 - 6 Mei 2012) dengan jumlah level (challenge) sebanyak 8 buah (meliputi 4 level application reverse engineering, 2 level network analysis and hacking, 2 level web hacking).#
  • 3. Level 1 – Simple Reverse Engineering
  • 4. Level 1 – Simple Reverse Engineering
  • 5. Level 2 – Simple Reverse Engineering
  • 6. Level 2 – Simple Reverse Engineering
  • 7. Level 2 – Simple Reverse Engineering
  • 8. Level 3 – Medium Reverse Engineering
  • 9. Level 3 – Medium Reverse Engineering
  • 10. Level 3 – Medium Reverse Engineering
  • 11. Level 3 – Medium Reverse Engineering
  • 12. Level 3 – Medium Reverse Engineering
  • 13. Level 3 – Medium Reverse Engineering
  • 14. Level 4 – Medium Reverse Engineering
  • 15. Level 4 – Medium Reverse Engineering
  • 16. Level 4 – Medium Reverse Engineering
  • 17. Level 4 – Medium Reverse Engineering
  • 18. Level 4 – Medium Reverse Engineering
  • 19. Level 5 – Packet Network Analysis #1
  • 20. Level 5 – Packet Network Analysis #1
  • 21. Level 5 – Packet Network Analysis #1
  • 22. Level 5 – Packet Network Analysis #1
  • 23. Level 5 – Packet Network Analysis #1
  • 24. Level 6 – Web Application Hacking #1
  • 25. Level 6 – Web Application Hacking #1
  • 26. Level 6 – Web Application Hacking #1
  • 27. Level 7 – Packet Network Analysis #2
  • 28. Level 7 – Packet Network Analysis #2
  • 29. Level 7 – Packet Network Analysis #2
  • 30. Level 8 – Web Application Hacking #2
  • 31. Level 8 – Web Application Hacking #2
  • 32. Level 8 – Web Application Hacking #2
  • 33. Level 8 – Web Application Hacking #2
  • 34. Level 8 – Web Application Hacking #2
  • 35. Level 8 – Web Application Hacking #2

×