Want a quick way to see what GPO's are applied to your local system, just using built in utilities? Using the GUI to manually view what settings are applied is awkward and slow. ?Use the following commands to see what policies are being handed down to the system you're on and what they're enforcing. ?This info can be incredibly handy during a pentest in order to find out the limitations being imposed on a specific system you've compromised.
Every year the hacking community, both black and whitehat, come together in Las Vegas for the annual Blackhat and Defcon conferences. We discuss new attacks, show interesting research, release tools, and let loose a bit. Defcon in particular centers around a number of great competitions, the most prestigious of them being the Defcon Capture The Flag.
Hacker teams from all over the world participate in the CTF qualifiers. This year 535 teams registered, 265 of which scored points. The top 10 play in the CTF event in Las Vegas at the conference. Think of it as a hacker superbowl.
This year we threw a team together, six guys (feakk, myself(@jhaddix),@OwNpile , @ap3r , @fulg0re , @timmedin), who had a few hours on the weekend to check out the game. Only a few of us had played before, but one of our team members won with Shellphish back a few years ago.
Below is the scoreboard format and links to the solutions that have been posted on the web (in English so far). It’s a jeopardy style point game, the higher the points, the harder the question. We placed 66th as team dirty_apes =) We had a great time and hopefully will get to spend the full 3 days to hack next year.
|Pursuits Trivial||Crypto Badness||Packet Madness||Binary L33tness||Pwtent Pwnables||Forensics|
Final Scores – http://www.ddtek.biz/qualsDC18scores.txt
Binaries to Download – http://work.hackerschool.org/DOWNLOAD/DefconCTF/2010/