Challenges‎ > ‎


The basic quiz for your everyday geek.

A more advanced quiz for the not so everyday geek.


The B100 challenge was created by Didier Stevens.  The device consisted of a LCD display and 3 sensors. These sensors needed to be activated in a specific sequence in order to input a PIN code. When the correct PIN (correct sequence) was used, the device displayed a secret code.

The first of the two hacking challenges.  In order to solve this exercise the attacker should have sufficient technical knowledge and a mindset that can think out of the box.

Our second hacking challenge were the goal was to gain access to the back-end of the "Royal Bank of Ireland" website.


C-100 was the first of our reverse engineering challenges and since the main goal of THF09 was to provide everybody a challenge and a taste of what pwnage, reverse engineering, etc. really was, it was kept really simple.
This was a straight-forward reverse engineering challenge.
The binary foo level 300 reverse engineering challenge was designed to be difficult to solve, but not too hard. Designing challenges nobody can solve isn't hard, the difficult part is finding the right balance so that people can still solve the challenge in the allotted time.

The easiest of the Out of the Box challenges.
It's always a treat when you give hackers a box. It only takes a few moments before they break it down and create a completely new box. D200-2009.exe looked like yet another binary, but was it ?
The question was straightforward : "What is the hidden number in this file?"