Reading Time: 4 minutes

How !SpamAndHex became a top hacker team (part 1)

Gábor Pék (CTO, Avatao)

Summer just started in 2011, when Gábor PékBuherátor and Bencsáth Boldizsár (aka “Boldi”) decided to do some nice hacking over the summer instead of going to splash in Lake Balaton all summer long. The annual international university hacking competition called iCTF was a big challenge with top competing teams. These guys needed to pull up their socks to have a chance.

The guys were not new in hacking, but they never considered competing before. They were typical self-taught hackers, reading blogs and hacker news, never learned hacking in the classroom.

To get better, they assembled a list of security topics to practice for the competition.

Most people were enjoying their vacation, but a small group of motivated students joined the effort. By September, the guys held regular meetings on Thursdays rigorously reviewing tools and hacks (with the help of some pizza and beer). The days of the iCTF 2011 competition came and the team finished 36th (named as Team.iCTF.CrySyS.A). I think this was the beginning of a beautiful friendship!

How did we get from this first CTF competition to compete twice at the DefCon finals? We will tell you in the next post.

In the meantime, we are creating awesome tutorial challenges for you to try some of these hacker tools. Check out the hacking tools above in the list and comment if you want to suggest some tools.

We’d also love to hear your thoughts. Leave a comment below if you have any questions or feedback, or let us know what cybersecurity topic you’d like to read about next!


Submit a Comment

Your email address will not be published.

Related Articles

JWT handling best practices

JWT handling best practices

Reading Time: 8 minutes The purpose of this post is to present one of the most popular authorization manager open standards JWT. It goes into depth about what JWT is, how it works, why it is secure, and what the most common security pitfalls are.

Ruby needs security

Ruby needs security

Reading Time: 10 minutes Every year, Ruby is becoming more and more popular thanks to its elegance, simplicity, and readability. Security, however, is an issue we can’t afford to neglect.