«
Expand/Collapse
23 items tagged "challenge"
Related tags:
contests [+],
security [+],
hacks [+],
eest [+],
bugtraq [+],
security challenge [+],
santa pede [+],
pede [+],
hackaday [+],
google [+],
arduino [+],
ARM [+],
yellow dots [+],
word [+],
struts [+],
smbs [+],
security event [+],
security authors [+],
secret txt [+],
school teachers [+],
santa [+],
robotic arm [+],
robot [+],
rich smith [+],
reminder [+],
red [+],
projects section [+],
project [+],
programming competition [+],
prizes [+],
physical coercion [+],
oscar rodriguez [+],
new challenge [+],
musical holiday [+],
mulitlevel [+],
mobile phone [+],
misc [+],
mains power [+],
mad skills [+],
louisville [+],
little guys [+],
laser cutter [+],
laser [+],
l.i.o.s. the [+],
l.i.o.s [+],
jeremy [+],
ithacka [+],
internet [+],
how to [+],
home [+],
holiday toy [+],
hartford [+],
hackito [+],
hacking challenge [+],
hacker group [+],
hacker convention [+],
gotroot [+],
gchq [+],
gauntlet [+],
friendly reminder [+],
freescale [+],
folder [+],
etc passwd [+],
duke [+],
dollar [+],
design challenge [+],
cutter [+],
crypto [+],
conclusion [+],
comers [+],
code [+],
cheap stuff [+],
bull [+],
brooklyn [+],
box [+],
bits and pieces [+],
big [+],
bbb [+],
backend [+],
appliances [+],
ants [+],
adam [+],
Pentesting [+]
-
-
6:01
»
Hack a Day
We love cheap stuff here. Who doesn’t? [Oscar Rodriguez Parra] does too, and wrote in to show us his super cheapey robot L.I.O.S. The build was for the AFRON design challenge, which involves building a 10 dollar robot to teach students robotics. The winners of the challenge were neat and all, but they all look [...]
-
-
9:01
»
Hack a Day
[V0R73X], who is 17 has been working on a project, to build A robotic arm. This project started out as a challenge put forward from one of his school teachers to build a robotic arm for $200. [VoR73X] accepted, and the challenge began. He came up with a robotic arm that can be controlled from his mobile phone and [...]
-
-
12:01
»
Hack a Day
[Adam] and [Jeremy] took on the challenge of designing a system that would make it easy to control appliances from the Internet. We’ve seen the concept many times before; it involves some method of switching mains power and connecting that mechanism to the Internet. This design is both well planned and nicely executed. We’re always [...]
-
-
16:01
»
Hack a Day
All of those orange, cyan, and yellow dots represent digital ants fighting for supremacy. This is a match to see who’s AI code is better in the Google backed programming competition: The AI Challenge. Before you go on to the next story, take a hard look at giving this a try for yourself. It’s set [...]
-
-
7:05
»
Hack a Day
When the Louisville hackerspace LVL1 was discussing the purchase of a new laser cutter, a member said, “I could build one before you get around to buying one.” The gauntlet was thrown down, a challenge was set, and the race was on to build a tiny laser cutter before the hackerspace took delivery of their [...]
-
-
11:15
»
Hack a Day
The crew over at the HarfordHackerspace used their wits and creativity to land a spot at the final round of Red Bull’s Creation challenge. The team arrived in Brooklyn just yesterday, ready to take on all comers in the 72-hour hacking challenge which kicked off earlier this morning. Like any other hacker convention, the Red [...]
-
-
6:06
»
Hack a Day
Throw down your mad skills and you might win some cash while you’re at it. [Zeta] tipped us off that Freescale just announced a new challenge. They call it the Make It Challenge and it centers around their 32-bit Kinetis microcontrollers. These are ARM Cortex-M4 chips and if you’re selected to compete they’ll offer their [...]
-
-
7:30
»
Hack a Day
This is just a friendly reminder that our Santa-Pede challenge will be ending soon. Please send your submissions to us by emailing them to bbb@hackaday.com or by posting them in the projects section of our forum (did we mention we have a forum now?) by the end of January to be considered. We don’t care [...]
-
-
10:53
»
Hack a Day
We are going to give the Santa-Pede Challenge another try. This time, you have till the end of January to do something (make it walk/crawl/scoot) with a dancing santa (or dancing musical holiday toy). As you can see in my example, it doesn’t have to be complicated or efficient in any way. Here are some [...]
-
-
14:14
»
Hack a Day
At the end of October we announced the Buy, Break, Build series kick off with “The Santa-pede Challenge“. The goal was to get your hands on one of those annoying dancing santas, tear it apart, then use its parts to build something that walks. We got our hands on some cool prizes and even got [...]
-
-
12:06
»
Hack a Day
Welcome to the first Buy Break Build at hackaday, sponsored by Adafruit Industries and Make. This challenge will be focusing on dancing Santas, or what is inside them. We’ve seen them everywhere, and may even have one or two in an attic somewhere. These annoying little guys should have enough bits and pieces inside to [...]
-
-
13:02
»
Hack a Day
The NY based hacker group named Ithacka has posted an interesting challenge. Buy a box of junk and build something with it following their guidelines. Document it and submit it for voting. There are some rules that allow you to use a few pieces that don’t come from the box, but the list is short. [...]
-
-
21:52
»
remote-exploit & backtrack
Hello all,
So a professor of my Computer Security course, together with the campus IT director, have offered my class a challenge. They've placed a file (aptly named secret.txt) with a secret word/phrase/something in a protected folder, and are offering extra credit if we can figure out what that word is. We aren't allowed to destroy anything or inhibit use of the server to other students, but past that anything (sans physical coercion and blackmail) goes.
The server is running SunOS 5.9. The folder, and all files within it that I know of, have 700 permissions, and both accounts I have access to are in the students group, whereas he's in the faculty group. We can print the shadowed /etc/passwd, but permission is denied to read or copy /etc/shadow.
We'll get credit whether we get caught or not, but ideas that get the secret word without alerting anybody are preferable. I'm familiar with unix/linux, but not so much with penetrating it. I come to you asking for advice and guidance in things to learn about that would aid me in this endeavor.
Thank you