Associate Researcher @ University of Piraeus
Michalis Takaronis is an Associate Researcher at the University of Piraeus. He is currently enrolled in the MSc on Digital System Security at the University of Piraeus.
Since 2021, he has been a member of the Security System Laboratory of the University of Piraeus.
He is also the Project Manager and Training Coordinator of the Hellenic Cyber Security Team for the ECSC. His research interests are in the field of binary exploitation and penetration testing.
In this short Capture the Flag (CTF) competition you will be asked to compete against each other in solving four security related challenges in about one hour. To solve a challenge, you may have to analyse digital files, reverse engineer binaries, crack hashes, break cryptographic algorithms or exploit programs’ vulnerabilities.
Three of the challenges will be offline and one will be online. For the offline challenges, you will have to download the challenges’ files and analyse them locally on your computer to recover the embedded flags. For the online challenge, you will be given access to a vulnerable service which you will have to hack and recover the hidden flag. During the competition the CTF organisers may change the pool of available challenges if any problem occurs (e.g. network problems) in order to keep the competition running.
Get ready, setup your Linux VMs, install your network analysers, fire up your reverse engineering tools and don’t forget to bring your exploitation cheat sheets. But remember… do not share flags, do not attack machines that are not part of the competition, do not attack the competition infrastructure, you may brute force only offline challenges, and of course have fun!
In this short Capture the Flag (CTF) competition you will be asked to compete against each other in solving four security related challenges in about one hour. To solve a challenge, you may have to analyse digital files, reverse engineer binaries, crack hashes, break cryptographic algorithms or exploit programs’ vulnerabilities.
Three of the challenges will be offline and one will be online. For the offline challenges, you will have to download the challenges’ files and analyse them locally on your computer to recover the embedded flags. For the online challenge, you will be given access to a vulnerable service which you will have to hack and recover the hidden flag. During the competition the CTF organisers may change the pool of available challenges if any problem occurs (e.g. network problems) in order to keep the competition running.
Get ready, setup your Linux VMs, install your network analysers, fire up your reverse engineering tools and don’t forget to bring your exploitation cheat sheets. But remember… do not share flags, do not attack machines that are not part of the competition, do not attack the competition infrastructure, you may brute force only offline challenges, and of course have fun!