Sunday , June 1 2025

CTF challenge
“Bonk police” secure first place CTFBD at MIST

Capture the flag CTF-2023 and Cyber Security Conference was held at MIST in the presence of around 150 participants from 29 teams. The event started on Saturday (November 4) morning ended with the prize distribution in the afternoon.

Team bonk police

“Bonk Police” took first place in the CTF competition securing 2425 points. The members of this team are Sheikh Ali Akbar of Feroz Mia Government College, Golam Rabbi from Rajshahi Medical College, Habibur Rahman from Tech Faring Ltd and Golam rabbi from Haji Azmat Government College.

Hacker claim Leak of Deloitte Source Code & GitHub Credentials

A hacker known as "303" claim to breach the company's systems and leaked sensitive internal data on a dark web...
Read More
Hacker claim Leak of Deloitte Source Code & GitHub Credentials

CISA Issued Guidance for SIEM and SOAR Implementation

CISA and ACSC issued new guidance this week on how to procure, implement, and maintain SIEM and SOAR platforms. SIEM...
Read More
CISA Issued Guidance for SIEM and SOAR Implementation

Linux flaws enable password hash theft via core dumps in Ubuntu, RHEL, Fedora

The Qualys Threat Research Unit (TRU) found two local information-disclosure vulnerabilities in Apport and systemd-coredump. Both issues are race-condition vulnerabilities....
Read More
Linux flaws enable password hash theft via core dumps in Ubuntu, RHEL, Fedora

Australia enacts mandatory ransomware payment reporting

New ransomware payment reporting rules take effect in Australia yesterday (May 30) for all organisations with an annual turnover of...
Read More
Australia enacts mandatory ransomware payment reporting

Why Govt Demands Foreign CCTV Firms to Submit Source Code?

Global makers of surveillance gear have clashed with Indian regulators in recent weeks over contentious new security rules that require...
Read More
Why Govt Demands Foreign CCTV Firms to Submit Source Code?

CVE-2023-39780
Botnet hacks thousands of ASUS routers

GreyNoise has discovered a campaign where attackers have gained unauthorized access to thousands of internet-exposed ASUS routers. This seems to...
Read More
CVE-2023-39780  Botnet hacks thousands of ASUS routers

Bangladesh Bank instructed using AI to prevent online gambling

The rise of online gambling in the country is leading to increased crime and societal issues. In response, the central...
Read More
Bangladesh Bank instructed using AI to prevent online gambling

251 Amazon-Hosted IPs Used in Exploit Scan for ColdFusion, Struts, and Elasticsearch

Cybersecurity researchers recently revealed a coordinated cloud-based scanning attack that targeted 75 different exposure points earlier this month. On May...
Read More
251 Amazon-Hosted IPs Used in Exploit Scan for ColdFusion, Struts, and Elasticsearch

Zero-Trust Policy bypass to Exploit Vulns & Manipulate NHI Secrets

Recent security research has shown that attackers can weaken zero-trust security frameworks by exploiting a key DNS vulnerability, disrupting automated...
Read More
Zero-Trust Policy bypass to Exploit Vulns & Manipulate NHI Secrets

Evaly E-commerce Platform Allegedly Hacked

Evaly, a Bangladeshi e-commerce platform, is reportedly facing a major data breach that may have exposed sensitive information of around...
Read More
Evaly E-commerce Platform Allegedly Hacked
Team JKKNIU C7b3r K9!ghts

The team of Jatiya Kabi Kazi Nazrul Islam University (JKKNIU C7b3r K9!ghts) got the 2nd place by getting 2250 points. The members of this group are Yousuf Abdullah, Farhana Mahbuba, Spondan Rema and Talukdar Omar Faruk, all students of the same university.

Team “Team Steamers”

“Team Steamers” took the third place with 2200 points. Rakib Ahmed Riad, Robiul Awal fagun , Munjor Hasan, Faisal Hossain are the members of this team and they belong to “Cyber Bangla”.

There were two seminars on Firmware and Hardware Backdooring and DNS Hijacking Attacks.

𝐌𝐝 𝐑𝐚𝐬𝐞𝐥 𝐁𝐡𝐮𝐲𝐚𝐧 , a distinguished cybersecurity researcher covered the security threats posed by malicious modifications to firmware and hardware in various devices. He discussed how attackers can implant backdoors at the production stage or through firmware updates, allowing them to gain unauthorized access to systems or networks. The discussion included case studies of known backdoors, techniques for inserting and exploiting these vulnerabilities, and strategies for detection and prevention.

𝐏𝐫𝐢𝐚𝐥 𝐈𝐬𝐥𝐚𝐦 𝐊𝐡𝐚𝐧, an Independent Security Researcher and Red Team Member at Synack Inc focuses on the attack methods involving the redirection of DNS queries to malicious websites or servers. He explores how attackers hijack DNS requests to control web traffic, leading to phishing attacks, malware distribution, or interception of confidential information. HE covers the different types of DNS hijacking, such as local, man-in-the-middle, or router hijacking, along with mitigation techniques, such as DNSSEC or trusted DNS resolvers, to protect against such threats.

As a chief guest Major General Saidul Islam, RCDS, NDC, PSC, Commandant, MIST said that the importance of cyber security is increasing day by day. We must always be ready for the needs of the age. CTF provides opportunities to enhance skills in various branches of cyber industry. He said that he was proud to be a part of this event.

One lakh twenty thousand tk were awarded to the winning team, eighty thousand tk to the first runner-up team and sixty thousand tk to the second runner-up team.

Infosecbulletin fell proud to be a media partner of this impactful event.

Check Also

𝐔𝐀𝐏 𝐂𝐘𝐁𝐄𝐑 𝐒𝐈𝐄𝐆𝐄

Registration open for ‘𝐔𝐀𝐏 𝐂𝐘𝐁𝐄𝐑 𝐒𝐈𝐄𝐆𝐄 𝟐𝟎𝟐𝟓’

𝐓𝐡𝐞 𝐂𝐲𝐛𝐞𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐂𝐥𝐮𝐛 of University of Asia Pacific (UAP) is going to arrange ‘𝐔𝐀𝐏 …

Leave a Reply

Your email address will not be published. Required fields are marked *