[oss] Computer and Network Security, moving forward

Lucian Mogosanu lucian.mogosanu at cs.pub.ro
Mon Jan 16 21:11:30 EET 2017


Hi everyone,

As discussed today at the lecture, there are a few ways for those of you
who liked the CNS class to further explore the field.

One way is to play wargames: IO/NetGarage [1] (some of the levels there
we've already explored in the labs), Smashthestack [2], WeChall [3],
Embedded Security CTF [4], Reverse Engineering Challenges [5], the
Reteam challenges [6] and many, many others -- all these are great ways
for you to further toy with binaries, reverse engineering and
exploiting.

Capture The Flag contests are another way: CTFtime [7] have an ongoing
list of past, present and future contests that you can join with a
team. Some of the "holy grails" are the CTF contests organized by DefCon
and BlackHat [8,9].

Finally, you can go for bug bounties. BugCrowd [10] and HackerOne [11]
are two platforms that list bug bounties in open and closed source
software. Also, the Internet Bug Bounty program [12] has identified some
open source projects (Apache, Python, OpenSSL, etc.) as core
infrastructure and is sponsoring those who find serious vulnerabilities.

If you have any further questions about this, don't hesitate to keep the
discussion going. Happy hacking!

Lucian

[1]: https://io.netgarage.org/
[2]: http://smashthestack.org/wargames.html
[3]: http://www.wechall.net/challs
[4]: https://microcorruption.com/login
[5]: https://challenges.re/
[6]: http://www.reteam.org/challenges.html
[7]: https://ctftime.org/
[8]: https://www.defcon.org/html/links/dc-ctf.html
[9]: https://www.blackhat.com/us-16/sponsored-workshops.html
[10]: https://bugcrowd.com/list-of-bug-bounty-programs
[11]: https://hackerone.com/
[12]: https://internetbugbounty.org/


More information about the oss mailing list