HackAdemy – eLearning Platform
HackAdemy – “Knowledge is Power” Opening October 10th Nowadays the learning process evolved by finding new ways to disseminate knowledge. New technologies can strongly help in education for presenting...
View ArticleHackaServer Hackathon October 5-7
We’ve done it before, we’ll do it again. It’s settled and we’re happy to announce you that on October 5-7 2012 we organize #HaSH (Hack a Server Hackathon). After three “Get Together” events and “Summer...
View ArticleHow-To-Web 2012 Stand out and Inovate
Hack a Server was created in order to resolve security vulnerabilities and/or flaws within servers, web applications or web frameworks using the power of crowd source. It is a Startup project and as a...
View ArticleHow To: Create a Target on HaS – Video
Willy Weiss is an ethical hacker who previously was in Romanian Army. He fought in the Afghanistan campaign and after that he joined the STS (Special Transmissions Services). Now he does penetration...
View ArticleHow To: Upload/Download files on HaS
Willy Weiss is an ethical hacker who previously was in Romanian Army. He fought in the Afghanistan campaign and after that he joined the STS (Special Transmissions Services). Now he does penetration...
View ArticleHacktivity 2012
What? Hacktivity is the IT Security Festival in Central and Eastern Europe. And boy, what a festival. A lot of InfoSec minded people were present, discussing IT Security topics. More on that later,...
View ArticleBug Bounty Programs part 1
This article is first part of a 4 series of articles that will analyze the present and the future of Bug Bounty Programs. It’s a point of view regarding improvement of online security for companies...
View ArticleBug Bounty Programs part 2
This is the second part from a 4 miniseries articles regarding Bug Bounty Programs. Previously we’ve talked about what BBPs are, what companies run such programs and how they can help your company. You...
View ArticleBug Bounty Programs part 3
In our second part we’ve presented a few startup companies that run “Bug Bounty Program as a Service”, and showed the pros and cons about such services. If you haven’t read the article yet, just click...
View ArticleBug Bounty Programs part 4
Over the last three articles we’ve discussed about BBPs (Bug Bounty Programs) trying to cover all their aspects and the trend of crowdsourcing information security. We talked about companies that run...
View ArticleCapture The Flag Free Platform
Capture The Flag Competitions can be run using our platform without worries regarding your laptop sensitive data. As a CTF organizer you will have full access and control over your Arena. You will be...
View ArticleRuby on Rails Internship
“Do you want to sell sugar water for the rest of your life, or do you want to come with me and change the world?” Steve Jobs to Pepsi executive John Sculley Looks like we grow faster than anticipated...
View ArticleMicrosoft Products Are Here
When we started to build our security training platform, one of our core objectives was to make the platform flexible. We wanted to provide our users with the flexibility and convenience of connecting...
View ArticleDouble Kill CTF Competition – The Rules
Art. 1 “Double Kill” is an offensive CTF (Capture The Flag) competition in which competitors are ranked based on their individual/team skill level and their ability to use their professional skills...
View ArticleWin2k8, WinXP, HacmeBank & HacmeCasino – Free Account
When you’re trying to get involved in the information security industry and become a security professional, having access to a fully functional penetration testing lab is critical. The pentest lab is...
View ArticleHacker’s Dome – Double Kill | The Official Writeup
Download links for the machine images: ctf02-01 ctf02-02 We recommend running the machine images inside of VirtualBox, which is the supervisor that we used to create the challenges. Installing and...
View ArticleHacker’s Dome – Double Kill | The Winners
First, I’d like to apologise for the long wait. If there’s someone to blame, than that’s me. Unfortunately, some things wont go as planned. The winners are as follows: 1st Place – Team dcua with...
View ArticleHattrick CTF Competition – Free Access
We all love CTFs competitions because it is challenging, fun, improve your hacking skills and bond new friendships. After First Blood and Double Kill, we proudly announce Hattrick. Difficulty Grade:...
View ArticleCTF365 – Open For Business
This article is for security professionals and system administrators who work for SMEs (Small and Medium Enterprises) and corporations. It’s also for security department/team leaders, system...
View ArticleCTF365: Why It Rocks – Two Years Startup Journey
The concept that drives CTF365 was inspired by the Internet, guided by capture the flag (CTF) competitions, and specially crafted for the ITC industry. CTF365 provides a platform where users and teams...
View Article