Hack South InfoSec Community

Recent Posts

TraceLabs Missing Persons CTF Podium

A few weeks ago, a rag tag motley crew from Hack South took part in the TraceLabs missing persons CTF as part of conINT 2020. It was our 4th shot as team Hack South, but this time we scored a podium finish and just missed out on 2nd place. This is the story of how we did it, with no case specifics.

0x03 - Getting started with Reverse Engineering

This post summarises the Meetup held on 1 December 2020. Agenda An introductory presentation on Software Reverse Engineering. A theory presentation will cover the types of outputs reverse engineers may investigate for CTFs and in practice. De-obfuscation, disassembly and decomplication will be discussed. We will look at the difference between static and dynamic analysis and how to use some of the common tools. The second half of the Meetup will feature two practical challenges: One guided, for attendees to follow along. The second one will be an exercise for attendees to try.

Announcing 0xcon 2020

0xcon 2020 is around the corner! We have some interesting local speakers sharing the hard work they have done over the year, and a privesc challenge that will be interesting to all of us. All of this will be done online due to COVID-19, but we are setting this up to maintain the collaborative nature of the event.

0x01 - First steps towards a foothold

This post summarises the Meetup held on 6 October 2020. Agenda An introductory session focussed on the first step when beginning on a new box: enumeration. A short presentation and a live demo will introduce on the theory and practice of initial enumeration and commonly used tools. Two Hack The Box 1-month VIP vouchers will be awarded to the top two contestants in a multiple-choice quiz! The second half of the Meetup will be dedicated to hacking together on the lab while sharing tips, tricks and advice.

0x00 - Starting from zero on Hack The Box

This post summarises the Meetup held on Tuesday 1 Sept 2020. Agenda An introductory session with the goal of getting everyone to pop a shell with EternalBlue. The backstory of WannaCry will be presented after a quick introduction. Then we will walk through the EternalBlue exploit and help everyone practice it in the HTB lab. Advanced attendees can skip forward to do other boxes on the private lab provided by HTB. The hosts will focus on walking new people through getting registered, set up, connected, and popping that 1st shell.