beVX Conference Challenge – OffensiveCon

During the event of OffensiveCon, we launched a reverse engineering and encryption challenge and gave the attendees the change to win great prizes.
The challenge was divided into two parts, a file – can be downloaded from here: – that you had to download and reverse engineer and server that you had to access to have a running version of this file.
The challenge could not have been resolved without access to the server as the encryption key that you were supposed to extract was only available in the running version on the server.
We had some great solutions sent to us, some of them were posted below – some arrived after the deadline, and some were not eligible as their solution was incomplete, but in the end we had three winners.
First place winner got an all paid, flight and hotel, and entry to our security conference beVX in September, second place prize winner got flight and entry to our security conference and the third place winner got a free entry to our event.

Hack2Win – VXCON Hong-Kong

Hi everyone,
We have decided this year to not only sponsor VXCON, but also to have a IoT hacking-village!
Will let you win prizes and show your skills in hacking network based devices.

Security conferences – Survival guide 2017 Q2

As we promised, the security conferences “Survival guide” for 2017 Q2 is here!
We have gathered the following information for you for each conference:

  • Dates
  • Place
  • Link to official conference website
  • Ticket price
  • Lectures
  • Workshops

So let’s get started:

Security conferences – Survival guide part 2

Security conferences – Survival guide 2017 Q1

We have some few more days until the end of the year (2016) but it’s time to open the calendar and get ready for 2017(!).
We will try publish every quarter the main security conferences*

DefCamp Romania 2016

We recently participated in DefCamp conference Romania. It’s our third time sponsoring this conference (!) and first time to attended.
Because it was the first time participated in person, we also sponsored the CTF competition and of course – we sponsored the flights, conference entry and accommodation to our community security researchers! that attended.
The opening session (November 9th) started with great opening keynote by Noam Rathaus. The lecture drew up his experiences in vulnerability research, Noam lectured about the complexity of the vulnerability report process.
After the opening keynote, we welcomed many of you security and vulnerability researchers in our booth at the Hacking Village to answer your questions and provide information about the SSD project and how it can help you to more easily report vulnerabilities and get paid for them.
On the second day we were given the honor to announce the CTF winning teams and awarded the prizes!
We sponsor the CTF competition with great love – as it is our way to give back to the security researchers community.
We gave the following prizes to these great teams:

  • 1st – scryptos (Japan) – 1500€
  • 2nd – CS16 (Poland) – 1000€
  • 3rd – DCUA (Ukraine) – 500€

We also conducted two (2) workshops on “Fuzzing” during the conference and gave an interview to DefCamp’s staff which was later posted on their conference web site.
We found the whole conference experience amazing – which was privilege for us to be able to attend and sponsor DefCamp 2016. Especially since it allowed us to be part of the ‘international’ community of security researchers.