Quantcast
Channel: CTF365 Blog
Browsing all 28 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

HackAdemy – eLearning Platform

HackAdemy – “Knowledge is Power” Opening October 10th Nowadays the learning process evolved by finding new ways to disseminate knowledge. New technologies can strongly help in education for presenting...

View Article


Image may be NSFW.
Clik here to view.

HackaServer Hackathon October 5-7

We’ve done it before, we’ll do it again. It’s settled and we’re happy to announce you that on October 5-7 2012 we organize #HaSH (Hack a Server Hackathon). After three “Get Together” events and “Summer...

View Article


Image may be NSFW.
Clik here to view.

How-To-Web 2012 Stand out and Inovate

Hack a Server was created in order to resolve security vulnerabilities and/or flaws within servers, web applications or web frameworks using the power of crowd source. It is a Startup project and as a...

View Article

Image may be NSFW.
Clik here to view.

How To: Create a Target on HaS – Video

 Willy Weiss is an ethical hacker who previously was in Romanian Army. He fought in the Afghanistan campaign and after that he joined the STS (Special Transmissions Services). Now he does penetration...

View Article

Image may be NSFW.
Clik here to view.

How To: Upload/Download files on HaS

Willy Weiss is an ethical hacker who previously was in Romanian Army. He fought in the Afghanistan campaign and after that he joined the STS (Special Transmissions Services). Now he does penetration...

View Article


Image may be NSFW.
Clik here to view.

Hacktivity 2012

What? Hacktivity is the IT Security Festival in Central and Eastern Europe. And boy, what a festival. A lot of InfoSec minded people were present, discussing IT Security topics. More on that later,...

View Article

Image may be NSFW.
Clik here to view.

Bug Bounty Programs part 1

This article is first part of a 4 series of articles that will analyze the present and the future of Bug Bounty Programs. It’s a point of view regarding improvement of online security for companies...

View Article

Image may be NSFW.
Clik here to view.

Bug Bounty Programs part 2

This is the second part from a 4 miniseries articles regarding Bug Bounty Programs. Previously we’ve talked about what BBPs are, what companies run such programs and how they can help your company. You...

View Article


Image may be NSFW.
Clik here to view.

Bug Bounty Programs part 3

In our second part we’ve presented a few startup companies that run “Bug Bounty Program as a Service”, and showed the pros and cons about such services. If you haven’t read the article yet, just click...

View Article


Image may be NSFW.
Clik here to view.

Bug Bounty Programs part 4

Over the last three articles we’ve discussed about BBPs (Bug Bounty Programs) trying to cover all their aspects and the trend of crowdsourcing information security. We talked about companies that run...

View Article

Image may be NSFW.
Clik here to view.

Capture The Flag Free Platform

Capture The Flag Competitions can be run using our platform without worries regarding your laptop sensitive data. As a CTF organizer you will have full access and control over your Arena. You will be...

View Article

Image may be NSFW.
Clik here to view.

Ruby on Rails Internship

“Do you want to sell sugar water for the rest of your life, or do you want to come with me and change the world?” Steve Jobs to Pepsi executive John Sculley Looks like we grow faster than anticipated...

View Article

Image may be NSFW.
Clik here to view.

Microsoft Products Are Here

When we started to build our security training platform, one of our core objectives was to make the platform flexible. We wanted to provide our users with the flexibility and convenience of connecting...

View Article


Image may be NSFW.
Clik here to view.

Double Kill CTF Competition – The Rules

  Art. 1 “Double Kill” is an offensive CTF (Capture The Flag) competition in which competitors are ranked based on their individual/team skill level and their ability to use their professional skills...

View Article

Image may be NSFW.
Clik here to view.

Win2k8, WinXP, HacmeBank & HacmeCasino – Free Account

When you’re trying to get involved in the information security industry and become a security professional, having access to a fully functional penetration testing lab is critical. The pentest lab is...

View Article


Image may be NSFW.
Clik here to view.

Hacker’s Dome – Double Kill | The Official Writeup

Download links for the machine images: ctf02-01 ctf02-02 We recommend running the machine images inside of VirtualBox, which is the supervisor that we used to create the challenges. Installing and...

View Article

Image may be NSFW.
Clik here to view.

Hacker’s Dome – Double Kill | The Winners

First, I’d like to apologise for the long wait. If there’s someone to blame, than that’s me. Unfortunately, some things wont go as planned. The winners are as follows: 1st Place – Team dcua with...

View Article


Image may be NSFW.
Clik here to view.

Hattrick CTF Competition – Free Access

We all love CTFs competitions because it is challenging, fun, improve your hacking skills and bond new friendships. After First Blood and Double Kill, we proudly announce Hattrick.   Difficulty Grade:...

View Article

Image may be NSFW.
Clik here to view.

CTF365 – Open For Business

This article is for security professionals and system administrators who work for SMEs (Small and Medium Enterprises) and corporations. It’s also for security department/team leaders, system...

View Article

Image may be NSFW.
Clik here to view.

CTF365: Why It Rocks – Two Years Startup Journey

The concept that drives CTF365 was inspired by the Internet, guided by capture the flag (CTF) competitions, and specially crafted for the ITC industry. CTF365 provides a platform where users and teams...

View Article
Browsing all 28 articles
Browse latest View live