![]() By the time we published the finale, the monthly Patreon funds completely reimbursed all our debt and allowed us to make more of the show than we ever dreamed of while paying everyone involved in the series a modest sum for their hard work.Īll the while, we’ve kept Wolf 359 completely ad free. Several years and credit cards later, we were shocked by the groundswell of support of you, our amazing listeners. But having grown up on a steady diet of radio plays and full-cast audiobooks, and seeing the success of modern audio fiction podcasts, we decided to try our hands at making movies for your ears. When Gabriel and I first set out to make the show in early 2014, we were fresh out of film school and excited to tell big, ambitious stories… but without the means to do so in film or TV. Wolf 359 has been finished for… oh man, almost four years now. also known Executive Producer and actor Zach Valenti here with a brief announcement. Fortunately, I managed to get it after cooling off.It’s Doug Eiffel. Submit your flag in this format: TISC.Īs a newbie to steganography, I felt that this level was the most “CTF-y” and actually got stuck for two days hunting flag 1 and ragequit for a while. We’ve sent the following secret message on a secret channel. I warmed up on basic forensics and steganography challenges. ![]() You should definitely read levels 8-10, but honestly every challenge from level 3 onwards is interesting. You may want to skip the earlier levels as they were fairly basic. What distinguished TISC from typical CTFs was its dual emphasis on hacking AND programming - rather than exploiting a single vulnerability, I often needed to automate exploits thousands of times. I took away important lessons for both CTFs and day-to-day red teaming that I hope others will find useful as well. Since I could only unlock each level by completing the previous one, I forced myself to learn new techniques every time. ![]() While I considered myself reasonably proficient in web, I stepped way out of my comfort zone tackling the broad array of domains, especially as an absolute beginner in pwn, forensics, and steganography. Levels 8 to 10 combined multiple domains and each one felt like a mini-CTF. I spent more than a hundred hours cracking my head against seemingly impossible tasks ranging from web, mobile, steganography, binary exploitation, custom shellcoding, cryptography and more. I placed 6th in the previous TISC and wanted to see what difference a year of learning had made. However, since I was playing for charity, I was more interested in testing my skills, particularly in the binary exploitation domain. For example, if there was only one solver for level 10, they would claim the full $10,000 for themselves. Participants unlocked the prize money in increments of $10,000 from level 8 to 10, with successful solvers splitting the pool equally. As you would expect, the prize pool grew accordingly - instead of $3,000 in vouchers in 2020, it was now $30,000 in cold hard cash. Now with two weeks and 10 levels, the difficulty and variety of the challenges greatly increased. This format created a big departure from last year’s iteration ( you can read my writeup here), which was a timed 48 hour challenge focused primarily on reverse engineering and binary exploitation. From 29 October to 14 November 2021, the Centre for Strategic Infocomm Technologies (CSIT) ran The InfoSecurity Challenge (TISC), an individual competition consisting of 10 levels that tested participants’ cybersecurity and programming skills.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |