Def Con 24 Post Mortem

Now that the dust has settled, and the Vegas alsohol has left my system, time to write the post mortem from Def Con 24.

I solved the Caezar Challenge (albiet I needed a tiny hint on the last stage, as there was a lt of confusion with the hint given which was misinterpreted), and got to chew out the guy who broke my lock (all was forgiven we can 3d print new parts). I came close, but did not successfully defuse The Box. And shenanigans ensued.

Read More

Def Con 24 Caezar Challenges URl Solving

Part of the Caezar challenge involved URL forcing. There were four characters, three unique, that were unsolved in the domain name. Using a combination of scripting and nslookup, it was trivial to solve (though later determined not to be necessary, but was possible after solving via traditional substitution cipher. I wont spoil the preferred method here since it was brlliant and may be used again).

Here I explain this process.

Read More

Def Con 24

As I write this post, sitting on a plane with my bits flowing through the ether that is tunnels and routers of the networking abyss, I ponder my previous years attending Def Con. My first year, DC 19, was fun with the tamper evident competition yet I could have done more had I a full tool set. So I brought one this year. Pelican makes neat tool chests, so I may be wandering around with it at points.

Anyone who wants to say high feel free to call if you see me. Twitter may be the fastest way to get my attention if you can’t find me.

I have to run fo the moment. The flight attendents are complaining that a purple tail is wagging into the person next to me. I have tried explaining that it must be an optical illusion, as there is no tail, but to no avail.

~H