<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dw="https://www.dreamwidth.org">
  <id>tag:dreamwidth.org,2009-05-01:155008</id>
  <title>Some experimental notes</title>
  <subtitle>yljatlhQo'! QIch lo'laltbebej!</subtitle>
  <author>
    <name>adric</name>
  </author>
  <link rel="alternate" type="text/html" href="https://adric.dreamwidth.org/"/>
  <link rel="self" type="text/xml" href="https://adric.dreamwidth.org/data/atom"/>
  <updated>2013-07-16T16:54:03Z</updated>
  <dw:journal username="adric" type="personal"/>
  <entry>
    <id>tag:dreamwidth.org,2009-05-01:155008:252410</id>
    <link rel="alternate" type="text/html" href="https://adric.dreamwidth.org/252410.html"/>
    <link rel="self" type="text/xml" href="https://adric.dreamwidth.org/data/atom/?itemid=252410"/>
    <title>Learn more about security</title>
    <published>2013-07-16T16:54:03Z</published>
    <updated>2013-07-16T16:54:03Z</updated>
    <category term="class"/>
    <category term="hacking"/>
    <category term="education"/>
    <category term="security"/>
    <dw:security>public</dw:security>
    <dw:reply-count>0</dw:reply-count>
    <content type="html">&lt;p&gt;&lt;i&gt;Do you want to know more?&lt;/i&gt;&lt;/p&gt;  &lt;p&gt;Want to learn more about memory analysis?&lt;/p&gt; &lt;ul&gt;&lt;li&gt;Install Volatility or grab SIFT VM&lt;/li&gt;&lt;li&gt;Get memory image samples from:&lt;ul&gt;&lt;li&gt;Volatility wiki: https://code.google.com/p/volatility/wiki/PublicMemoryImages&lt;/li&gt;&lt;li&gt;HoneyNet: http://honeynet.org/challenges/2010_3_banking_troubles&lt;/li&gt;&lt;li&gt;Book:&lt;i&gt; &lt;/i&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Practice, practice, practice&lt;ul&gt;&lt;li&gt;Image your own hosts and analyze them&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Write about what you find out!&lt;/li&gt;&lt;/ul&gt;Want to learn more about (web) application security?&lt;br /&gt; &lt;ul&gt;&lt;li&gt;Install proxy tools and browser plugins or get Samurai WTF&lt;/li&gt;&lt;li&gt;Get sample vulnerable web apps :&lt;ul&gt;&lt;li&gt;Samurai includes WebGoat, Mutilidae, and others&lt;/li&gt;&lt;li&gt;Google Gruyere: http://google-gruyere.appspot.com/&lt;/li&gt;&lt;li&gt;BodgeIt Store : http://code.google.com/p/bodgeit/&lt;/li&gt;&lt;li&gt;Book: &lt;i&gt;The Tangled Web&lt;/i&gt; : http://lcamtuf.coredump.cx/tangled/&lt;/li&gt;&lt;li&gt;Read, participate: OWASP:&amp;nbsp; https://www.owasp.org/index.php/Main_Page&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Practice, practice, practice&lt;ul&gt;&lt;li&gt;Test your own apps in the lab&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Write about what you find out!&lt;/li&gt;&lt;/ul&gt;What to learn more about host forensics?&lt;br /&gt; &lt;ul&gt;&lt;li&gt;Get SIFT and FTK Imager (etc)&lt;/li&gt;&lt;li&gt;Get sample images and challenges:&lt;ul&gt;&lt;li&gt;HoneyNet Challenges: http://honeynet.org/challenges&lt;/li&gt;&lt;li&gt;EH Net Challenges: https://www.ethicalhacker.net/category/features/skillz&lt;/li&gt;&lt;li&gt;&lt;i&gt;Advanced&lt;/i&gt; Digital Corpora: http://digitalcorpora.org/corpora/scenarios&lt;/li&gt;&lt;li&gt;Book: &lt;i&gt;File System Forensics Analysis:&lt;/i&gt; http://www.digital-evidence.org/&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Practice, practice, practice&lt;ul&gt;&lt;li&gt;Image your own hosts and analyze them&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Write about what you find out!&lt;/li&gt;&lt;/ul&gt;Want to learn more about network monitoring, network forensics?&lt;br /&gt; &lt;ul&gt;&lt;li&gt;Get Security Onion and SIFT&lt;/li&gt;&lt;li&gt;Get some sample captures and logs:&lt;ul&gt;&lt;li&gt;/opt/samples in SecurityOnion&lt;/li&gt;&lt;li&gt;Wireshark's samples wiki :http://wiki.wireshark.org/SampleCaptures&lt;/li&gt;&lt;li&gt;(Network) Forensics Contest . com : http://forensicscontest.com/&lt;/li&gt;&lt;li&gt;&lt;i&gt;Advanced: &lt;/i&gt;Johannes packet challenges:&amp;nbsp; http://johannes.homepc.org/packet.txt&lt;/li&gt;&lt;li&gt;Book: &lt;i&gt;Practice of NSM&lt;/i&gt; and samples : http://nostarch.com/nsm&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Practice, practice, practice&lt;ul&gt;&lt;li&gt;Record, monitor, analyze your own networks&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Write about what you find out!&lt;/li&gt;&lt;/ul&gt;Want to learn more about artifact analysis and reverse engineering malware?&lt;br /&gt; &lt;ul&gt;&lt;li&gt;Get REMnux and demos of IDA, Hopper. Download OllyDbg&lt;/li&gt;&lt;li&gt;Get some sample files:&lt;ul&gt;&lt;li&gt;Contagio : http://contagiodump.blogspot.com/&lt;/li&gt;&lt;li&gt;VirusShare : https://virusshare.com/&lt;/li&gt;&lt;li&gt;your &lt;a href="http://f.adric.net/index.cgi/wiki?name=Email%20EXEs%20and%20free%20tools"&gt;inbox &lt;/a&gt;&lt;/li&gt;&lt;li&gt;&amp;nbsp;Book:&lt;i&gt; Practical Malware Analysis&lt;/i&gt; and exercises&lt;i&gt;: &lt;/i&gt;http://practicalmalwareanalysis.com/&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Practice, practice, practice&lt;ul&gt;&lt;li&gt;Dissect and analyze the files around you&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Write about what you find out!&lt;/li&gt;&lt;/ul&gt;  &lt;p&gt;^.*$&lt;/p&gt; &lt;ul&gt;&lt;li&gt;Compete in the DC3 Challenge! &lt;a href="http://www.dc3.mil/challenge/"&gt;http://www.dc3.mil/challenge/&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;Comments appreciated. Live wiki doc is at http://f.adric.net/index.cgi/wiki?name=LearnMoreSecurity&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src="https://www.dreamwidth.org/tools/commentcount?user=adric&amp;ditemid=252410" width="30" height="12" alt="comment count unavailable" style="vertical-align: middle;"/&gt; comments</content>
  </entry>
  <entry>
    <id>tag:dreamwidth.org,2009-05-01:155008:251488</id>
    <link rel="alternate" type="text/html" href="https://adric.dreamwidth.org/251488.html"/>
    <link rel="self" type="text/xml" href="https://adric.dreamwidth.org/data/atom/?itemid=251488"/>
    <title>Static analysis:Sometime an icon is just an icon?</title>
    <published>2013-04-30T14:53:46Z</published>
    <updated>2013-04-30T14:53:46Z</updated>
    <category term="malware"/>
    <category term="security"/>
    <dw:security>public</dw:security>
    <dw:reply-count>0</dw:reply-count>
    <content type="html">&lt;p&gt;&lt;i&gt;I try to take advantage of the malware samples in my inbox every day to practice analysis and learn cool news tools. A previous &lt;a href="http://adric.net/index.cgi/wiki?name=Email+EXEs+and+free+tools"&gt;post&lt;/a&gt; covers some of the basics.&lt;/i&gt;&lt;/p&gt;

&lt;p&gt;This week I got an "eFAX" message with a zip file attachment that was quite suspicious so I dug right into it. It's defintiely a Win32 PE file (exe) inside the zip despite the Adobe-esque PDF icon it's using and although ClamAV didn't find anything VirusTotal confirms that most of the planet thinks it is bad news indeed. Here's the &lt;a href="https://www.virustotal.com/en/file/fd791a9892e6d930326d320115c768adb5be27c555bc1f690bc84cdda2e5680e/analysis/"&gt;VT&lt;/a&gt; and &lt;a href="http://anubis.iseclab.org/?action=result&amp;amp;task_id=177e485bd86efc5b4f936dc11885cd1e8&amp;amp;format=html"&gt;Annubis&lt;/a&gt; reports for the binary.&lt;/p&gt;

&lt;p&gt;From there I tried to apply some of the techniques I am reading about in Practical Malware Analysis&lt;sup&gt;1&lt;/sup&gt; an awesome book that walks through the proceedures and tools needed to disect and analyze files. I'm just starting the book and have been reading about the Windows Portable executable format, so PE header analysis, I chose you!&lt;/p&gt;

&lt;span class="cut-wrapper"&gt;&lt;span style="display: none;" id="span-cuttag___1" class="cuttag"&gt;&lt;/span&gt;&lt;b class="cut-open"&gt;(&amp;nbsp;&lt;/b&gt;&lt;b class="cut-text"&gt;&lt;a href="https://adric.dreamwidth.org/251488.html#cutid1"&gt;PE Header analysis, I chose you to battle the mysterious eFAX DIGIT 30!&lt;/a&gt;&lt;/b&gt;&lt;b class="cut-close"&gt;&amp;nbsp;)&lt;/b&gt;&lt;/span&gt;&lt;div style="display: none;" id="div-cuttag___1" aria-live="assertive"&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src="https://www.dreamwidth.org/tools/commentcount?user=adric&amp;ditemid=251488" width="30" height="12" alt="comment count unavailable" style="vertical-align: middle;"/&gt; comments</content>
  </entry>
  <entry>
    <id>tag:dreamwidth.org,2009-05-01:155008:251382</id>
    <link rel="alternate" type="text/html" href="https://adric.dreamwidth.org/251382.html"/>
    <link rel="self" type="text/xml" href="https://adric.dreamwidth.org/data/atom/?itemid=251382"/>
    <title>Recent online discussions about security awareness training and education effectiveness</title>
    <published>2013-03-20T14:33:36Z</published>
    <updated>2013-03-20T14:33:36Z</updated>
    <category term="education"/>
    <category term="security"/>
    <dw:security>public</dw:security>
    <dw:reply-count>0</dw:reply-count>
    <content type="html">&lt;span lang="en-US"&gt;&lt;div style="margin:0;"&gt;&lt;font size="2" face="Calibri,sans-serif"&gt;&lt;span style="font-size:11pt;"&gt;&lt;font size="3" face="Times New Roman,serif"&gt;&lt;span style="font-size:12pt;"&gt;Bruce Schneier's 19 March 2013 &lt;/span&gt;&lt;/font&gt;&lt;a target="_blank" href="https://webmail.secureworks.com/owa/bknowles@secureworks.com/redir.aspx?C=g0zOcYxZOkCwaBEqtlmS18_0xfYO-c8ILHQ3mjgT3C3deey6GBRyKvMn-6ho5twhUm60TDOYBy4.&amp;amp;URL=http%3a%2f%2fwww.darkreading.com%2fblog%2f240151108%2fon-security-awareness-training.html"&gt;&lt;font size="3" face="Times New Roman,serif"&gt;&lt;span style="font-size:12pt;"&gt;blog&lt;/span&gt;&lt;/font&gt;&lt;/a&gt;&lt;font size="3" face="Times New Roman,serif"&gt;&lt;span style="font-size:12pt;"&gt; on DarkReading &amp;quot;On Security Awareness Training: The focus on training  obscures the failures of security design&amp;quot; is making headlines with his  bold assertion that &amp;quot;training users in security is generally a waste of  time and that the money can be spent better elsewhere&amp;quot;. The piece argues by examples from other fields of health and  safety education that complex decision making can't be easily taught to  a large population in an effective way and that if security awareness  training as enacted in the past 20 years was effective we would see commensurate change in the behaviour of the  population.&lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt; &lt;font size="2" face="Calibri,sans-serif"&gt;&lt;span style="font-size:11pt;"&gt;&lt;font size="3" face="Times New Roman,serif"&gt;&lt;span style="font-size:12pt;"&gt;Schneier&amp;rsquo;s standing as a cryptographer and esteemed author gives tremendous weight to this controversial argument. &lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;  &lt;div style="margin:0;"&gt;&lt;font size="2" face="Calibri,sans-serif"&gt;&lt;span style="font-size:11pt;"&gt;&lt;font size="3" face="Times New Roman,serif"&gt;&lt;span style="font-size:12pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt; &lt;div style="margin:0;"&gt;&lt;font size="2" face="Calibri,sans-serif"&gt;&lt;span style="font-size:11pt;"&gt;&lt;font size="3" face="Times New Roman,serif"&gt;&lt;span style="font-size:12pt;"&gt;Although Schneier's editorial is more persuasively written and less overtly provocative he is essentially arguing a similar point as Immunity's Dave Aitel did in his 18 July 2012 &lt;/span&gt;&lt;/font&gt;&lt;a target="_blank" href="https://webmail.secureworks.com/owa/bknowles@secureworks.com/redir.aspx?C=g0zOcYxZOkCwaBEqtlmS18_0xfYO-c8ILHQ3mjgT3C3deey6GBRyKvMn-6ho5twhUm60TDOYBy4.&amp;amp;URL=http%3a%2f%2fwww.csoonline.com%2farticle%2f711412%2fwhy-you-shouldn-t-train-employees-for-security-awareness"&gt;&lt;font size="3" face="Times New Roman,serif"&gt;&lt;span style="font-size:12pt;"&gt;editorial&lt;/span&gt;&lt;/font&gt;&lt;/a&gt;&lt;font size="3" face="Times New Roman,serif"&gt;&lt;span style="font-size:12pt;"&gt; on CISO Magazine &amp;quot;Why you shouldn't train employees for security  awareness: Dave Aitel argues that money spent on awareness training is  money wasted&amp;quot;. Aitel&amp;rsquo;s recommendation is to eliminate awareness training  and instead fund secure development and software testing to harden systems so that user behaviour isn&amp;rsquo;t so dangerous to  the organization: &amp;ldquo;It's a much better corporate IT philosophy that  employees should be able to click on any link, open any attachment,  without risk of harming the organization&amp;rdquo;.&lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt; &lt;div style="margin:0;"&gt;&lt;font size="2" face="Calibri,sans-serif"&gt;&lt;span style="font-size:11pt;"&gt;&lt;font size="3" face="Times New Roman,serif"&gt;&lt;span style="font-size:12pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt; &lt;div style="margin:0;"&gt;&lt;font size="2" face="Calibri,sans-serif"&gt;&lt;span style="font-size:11pt;"&gt;&lt;font size="3" face="Times New Roman,serif"&gt;&lt;span style="font-size:12pt;"&gt;Aitel's piece provoked&amp;nbsp; much discussion and many online rebuttals&lt;/span&gt;&lt;/font&gt;&lt;font size="-1" face="Times New Roman,serif"&gt;&lt;sup&gt;1&lt;/sup&gt;&lt;/font&gt;&lt;font size="3" face="Times New Roman,serif"&gt;&lt;span style="font-size:12pt;"&gt; and Schneier's post has already generated some well-reasoned responses. Benjamin Mauch commented to link to his spirited &lt;/span&gt;&lt;/font&gt;&lt;a target="_blank" href="https://webmail.secureworks.com/owa/bknowles@secureworks.com/redir.aspx?C=g0zOcYxZOkCwaBEqtlmS18_0xfYO-c8ILHQ3mjgT3C3deey6GBRyKvMn-6ho5twhUm60TDOYBy4.&amp;amp;URL=http%3a%2f%2fben0xa.com%2fsecurity-awareness-education%2f"&gt;&lt;font size="3" face="Times New Roman,serif"&gt;&lt;span style="font-size:12pt;"&gt;rebuttal&lt;/span&gt;&lt;/font&gt;&lt;/a&gt;&lt;font size="3" face="Times New Roman,serif"&gt;&lt;span style="font-size:12pt;"&gt; &amp;quot;Security Awareness Education&amp;quot;. He is quite passionate about security  awareness and has given talks on security education including one  recently at &lt;/span&gt;&lt;/font&gt;&lt;a target="_blank" href="https://webmail.secureworks.com/owa/bknowles@secureworks.com/redir.aspx?C=g0zOcYxZOkCwaBEqtlmS18_0xfYO-c8ILHQ3mjgT3C3deey6GBRyKvMn-6ho5twhUm60TDOYBy4.&amp;amp;URL=http%3a%2f%2fwww.irongeek.com%2fi.php%3fpage%3dvideos%2fderbycon2%2f2-2-7-benjamin-mauch-creating-a-powerful-user-defense-against-attackers"&gt;&lt;font size="3" face="Times New Roman,serif"&gt;&lt;span style="font-size:12pt;"&gt;Derby Con&lt;/span&gt;&lt;/font&gt;&lt;/a&gt;&lt;font size="3" face="Times New Roman,serif"&gt;&lt;span style="font-size:12pt;"&gt;.  Mauch argues that the mechanisms of training in common use, such as  computer based training and quizzes, perform poorly but that engagement  and education of users to develop a User Defense &amp;quot;layer&amp;quot; is effective and vital to defense.&lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt; &lt;div style="margin:0;"&gt;&lt;font size="2" face="Calibri,sans-serif"&gt;&lt;span style="font-size:11pt;"&gt;&lt;font size="3" face="Times New Roman,serif"&gt;&lt;span style="font-size:12pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt; &lt;div style="margin:0;"&gt;&lt;font size="2" face="Calibri,sans-serif"&gt;&lt;span style="font-size:11pt;"&gt;&lt;font size="3" face="Times New Roman,serif"&gt;&lt;span style="font-size:12pt;"&gt;Mauch's colleague Dave Kennedy, Founder and Principal Security Consultant at TrustedSec, posted his own &lt;/span&gt;&lt;/font&gt;&lt;a target="_blank" href="https://webmail.secureworks.com/owa/bknowles@secureworks.com/redir.aspx?C=g0zOcYxZOkCwaBEqtlmS18_0xfYO-c8ILHQ3mjgT3C3deey6GBRyKvMn-6ho5twhUm60TDOYBy4.&amp;amp;URL=https%3a%2f%2fwww.trustedsec.com%2fmarch-2013%2fthe-debate-on-security-education-and-awareness%2f"&gt;&lt;font size="3" face="Times New Roman,serif"&gt;&lt;span style="font-size:12pt;"&gt;response&lt;/span&gt;&lt;/font&gt;&lt;/a&gt;&lt;font size="3" face="Times New Roman,serif"&gt;&lt;span style="font-size:12pt;"&gt; to Schneier's post titled &amp;quot;The Debate on Security Education and  Awareness&amp;quot;. Kennedy outlines his concerns with the general ideas in  Schneier's post and then examines a handful of the arguments quote by  quote from the DarkReading post. He on expands a few of the metaphors (eg driver education) and shows how a broader  interpretation of them supports a different view.&lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt; &lt;div style="margin:0;"&gt;&lt;font size="2" face="Calibri,sans-serif"&gt;&lt;span style="font-size:11pt;"&gt;&lt;font size="3" face="Times New Roman,serif"&gt;&lt;span style="font-size:12pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt; &lt;div style="margin:0;"&gt;&lt;font size="2" face="Calibri,sans-serif"&gt;&lt;span style="font-size:11pt;"&gt;&lt;font size="3" face="Times New Roman,serif"&gt;&lt;span style="font-size:12pt;"&gt;&lt;sup&gt;1&lt;/sup&gt;&lt;/span&gt;&lt;/font&gt;&lt;font size="3" face="Times New Roman,serif"&gt;&lt;span style="font-size:12pt;"&gt; Rebuttals to Aitel include:&lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt; &lt;div style="margin:0;"&gt;&lt;font size="2" face="Calibri,sans-serif"&gt;&lt;span style="font-size:11pt;"&gt;&lt;font size="3" face="Times New Roman,serif"&gt;&lt;span style="font-size:12pt;"&gt;http://www.infosecisland.com/blogview/21981-Throwing-the-Baby-Out-with-the-Bath-Water.html&lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt; &lt;div style="margin:0;"&gt;&lt;font size="2" face="Calibri,sans-serif"&gt;&lt;span style="font-size:11pt;"&gt;&lt;font size="3" face="Times New Roman,serif"&gt;&lt;span style="font-size:12pt;"&gt;http://www.iamit.org/blog/2012/07/security-awareness-and-security-context-aitel-and-krypt3ia-are-both-wrong/&lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt; &lt;div style="margin:0;"&gt;&lt;font size="2" face="Calibri,sans-serif"&gt;&lt;span style="font-size:11pt;"&gt;&lt;a target="_blank" href="https://webmail.secureworks.com/owa/bknowles@secureworks.com/redir.aspx?C=g0zOcYxZOkCwaBEqtlmS18_0xfYO-c8ILHQ3mjgT3C3deey6GBRyKvMn-6ho5twhUm60TDOYBy4.&amp;amp;URL=http%3a%2f%2fwww.infosecisland.com%2fblogview%2f21990-You-Shouldnt-Train-Employees-for-Security-Awareness-Rebuttal.html"&gt;&lt;font size="3" face="Times New Roman,serif"&gt;&lt;span style="font-size:12pt;"&gt;http://www.infosecisland.com/blogview/21990-You-Shouldnt-Train-Employees-for-Security-Awareness-Rebuttal.html&lt;/span&gt;&lt;/font&gt;&lt;/a&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src="https://www.dreamwidth.org/tools/commentcount?user=adric&amp;ditemid=251382" width="30" height="12" alt="comment count unavailable" style="vertical-align: middle;"/&gt; comments</content>
  </entry>
  <entry>
    <id>tag:dreamwidth.org,2009-05-01:155008:250923</id>
    <link rel="alternate" type="text/html" href="https://adric.dreamwidth.org/250923.html"/>
    <link rel="self" type="text/xml" href="https://adric.dreamwidth.org/data/atom/?itemid=250923"/>
    <title>DC3 Forensics Challenge 2012: Well, that went quite a bit better than expected!</title>
    <published>2012-12-07T00:56:01Z</published>
    <updated>2012-12-07T00:56:01Z</updated>
    <category term="forensics"/>
    <category term="dc3"/>
    <category term="security"/>
    <dw:security>public</dw:security>
    <dw:reply-count>0</dw:reply-count>
    <content type="html">This was us:&lt;br /&gt;&lt;img src="http://static.adric.net/img/dc3-2012-final-score-pg.png" alt="DC3 Challenge 2012 - Final Team Scores - Peachtree" /&gt;&lt;br /&gt;&lt;br /&gt;See all the results for the 2012 competition at&amp;nbsp;&lt;a href="http://www.dc3.mil/challenge/2012/stats/leaderboard.php"&gt;http://www.dc3.mil/challenge/2012/stats/leaderboard.php&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Registration for the 2013 challenge opens on the 17th, so get ready!&lt;br type="_moz" /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src="https://www.dreamwidth.org/tools/commentcount?user=adric&amp;ditemid=250923" width="30" height="12" alt="comment count unavailable" style="vertical-align: middle;"/&gt; comments</content>
  </entry>
</feed>
