Challenges‎ > ‎

v2009

 A100
The basic quiz for your everyday geek.

Solution: http://blog.thehexfactor.org/2010/05/solutions-hex-factor-v2009-level-a100.html
 A200
A more advanced quiz for the not so everyday geek.

Solution:
http://blog.thehexfactor.org/2010/06/solutions-hex-factor-v2009-level-a200.html

 B100
The B100 challenge was created by Didier Stevens.  The device consisted of a LCD display and 3 sensors. These sensors needed to be activated in a specific sequence in order to input a PIN code. When the correct PIN (correct sequence) was used, the device displayed a secret code.

Solution: http://blog.thehexfactor.org/2010/05/solutions-hex-factor-v2009-level-b100.html
 B200
The first of the two hacking challenges.  In order to solve this exercise the attacker should have sufficient technical knowledge and a mindset that can think out of the box.

Solution: http://blog.thehexfactor.org/2010/06/solutions-hex-factor-v2009-level-b200.html
 B300
Our second hacking challenge were the goal was to gain access to the back-end of the "Royal Bank of Ireland" website.

Solution: http://blog.thehexfactor.org/2010/07/solutions-hex-factor-v2009-level-b300.html

 C100
C-100 was the first of our reverse engineering challenges and since the main goal of THF09 was to provide everybody a challenge and a taste of what pwnage, reverse engineering, etc. really was, it was kept really simple.
 
 C200
This was a straight-forward reverse engineering challenge.
 
 C300
The binary foo level 300 reverse engineering challenge was designed to be difficult to solve, but not too hard. Designing challenges nobody can solve isn't hard, the difficult part is finding the right balance so that people can still solve the challenge in the allotted time.
 

 D100
The easiest of the Out of the Box challenges.
 
 D200
It's always a treat when you give hackers a box. It only takes a few moments before they break it down and create a completely new box. D200-2009.exe looked like yet another binary, but was it ?
 
 D300
The question was straightforward : "What is the hidden number in this file?"