diff --git a/CNAME b/CNAME new file mode 100644 index 0000000..ef15a7d --- /dev/null +++ b/CNAME @@ -0,0 +1 @@ +summit.nusgreyhats.org diff --git a/favicon.png b/favicon.png new file mode 100755 index 0000000..5c4f729 Binary files /dev/null and b/favicon.png differ diff --git a/home.css b/home.css new file mode 100644 index 0000000..a174d87 --- /dev/null +++ b/home.css @@ -0,0 +1,102 @@ +body { + position: absolute; + color: #FEFEFE; + background-color: #0A0B11; + margin: 0 auto; + padding: 1em 0 1em 0; +} +a { + color: #93ffd7; + text-decoration: underline; +} +img { + width: 100vh; + height: auto; + +} +@font-face { + font-family: "unifont"; + src: url("./unifont.woff") format('woff'); +} +pre { + font-family: "unifont", "Lucida Console", monospace, Monaco; + font-size:2vh; + line-height: 1.0; + padding-left:3vh; +} +.txtdiv { + display: block; + text-align: left; + word-wrap: break-word; + overflow-wrap: break-word; +} +.typewriter { + width: 20ch; + animation: typing 2s steps(22), blink .5s step-end infinite alternate; + white-space: nowrap; + overflow: hidden; + border-right: 3px solid #FFFFFF; +} +@keyframes typing { + from { + width: 0 + } +} +@keyframes blink { + 50% { + border-color: transparent + } +} +x { + color: #a7c7e7; + text-decoration: none; +} + + +.highlighted { + background-color: #fff8dc; /* Light yellow background */ + color: #ff0000; /* Red text color for the heading */ + padding: 2vh 3vh; /* Padding around the text */ + border-radius: 5px; /* Rounded corners (optional) */ + display: inline-block; /* Make the background fit the content */ +} + +.announcement-box { + box-shadow: 0 0 10px rgba(0, 0, 0, 0.1); + max-width: 95vh; + text-align: center; + padding: 20px; +} + +.announcement-box h3 { + margin-top: 2vh; + font-size: 2.5vh; +} + +.custom-table { + border-collapse: collapse; + width: 80%; + background-color: #222; /* Dark background for the table */ + /* box-shadow: 0 0 10px rgba(0, 255, 0, 0.5); /* Green shadow */ */ +} + +.custom-table th, +.custom-table td { + font-size: 2vh; /* Set font size for the entire table */ + border: 2px solid #000; /* Green border */ + padding: 8px; + text-align: center; +} + +.custom-table th { + background-color: #333; /* Slightly lighter black for header */ + color: #939fd7; /* Green text for header */ +} + +.custom-table tr:nth-child(even) { + background-color: #333; /* Slightly lighter black for even rows */ +} + +.custom-table tr:hover { + background-color: #939fd7; /* Dark green hover effect */ +} diff --git a/index.html b/index.html new file mode 100644 index 0000000..f1bb319 --- /dev/null +++ b/index.html @@ -0,0 +1,162 @@ + +
++ +registrations are still open! click here to register now!
+ +~ greyctf summit + +GreyCTF summit is a mini Cybersecurity conference consisting of technical talks, +workshops and insightful industry-related booths to share more about the industry! + +Our objective for the summit is to provide a platform for students to explore +their interest in cybersecurity, providing them with opportunities to connect and +learn from industry professionals to find out what the industry is like. + +Limited slots available, sign up here! + + +~ event schedule + +DATE : 10th August 2024 + +TIME : 10:00AM to 04:30PM + +VENUE : NUS School of Computing, COM1 Level 2 +
Time | +Activity | +
---|---|
1000h - 1045h | +Series of Opening Talks by our Sponsors | +
1045h - 1100h | +CTF Award Presentation | +
1100h - 1130h | +Talk 1 | +
1130h - 1200h | +Talk 2 | +
1200h - 1330h | +Lunch & Networking | +
1330h - 1400h | +Talk 3 | +
1400h - 1600h | +Workshop | +
1600h - 1630h | +Closing Ceremony | +
+ +~ talk title + +Today’s Threat Landscape & You + + +~ talk sypnosis + +coming soon! + + +
+ +~ about speaker + +++ + +< go back ++
+ to be confirmed. ++
+ +~ talk title + +How CTF-type skills will be useful in a Cybersecurity career? + + +~ talk sypnosis + +In this presentation, we explore how the skills honed through Capture The Flag (CTF) competitions can +pave the way for a successful career in security research. + +CTFs are competitive events that challenge participants to solve complex cybersecurity problems, +fostering a deep understanding of various security concepts. + +We will examine the differences between playing CTFs and real world cybersecurity research and how +aspiring security researchers can build a strong foundation for their careers. + + +
+ +~ about speaker + +++ + +< go back ++
+ Teck Siong is a Security Researcher at DSO where the team research and develop solutions to stay + ahead of potential cybersecurity threats. His current work involves embedded systems, + SCADA systems and penetration testing. + + In addition to DSO’s mission to support Defence R&D, Teck Siong’s role also allows him to work + with various government organizations to evaluate the security of running systems. ++
+ +~ talk title + +why is it important to consider other factors in the development of android-based malware? + + +~ talk sypnosis + +Frequently, when developing malware or malicious software, we tend to concentrate solely on exploiting +vulnerabilities. However, what other factors should be taken into account in this process? + +Drawing from my publication, "A-COPILOT: Android Covert Operation for Private Information Lifting and OTP Theft", +this discussion will explore the importance of considering factors such as stealthiness and obfuscation. + +
+ +~ about speaker + +++ + +< go back ++
+ Joseph is a Year 2 Information Security student at the Singapore Institute of Technology (SIT). + + Within his time in SIT he has been presented various awards like the GovTech Top Student Award + and Rotary Club of Bugis Junction Commendation Award. + + Outside of academics, he is part of the student management committee,breaching the gap between + lecturers and students, as well as kick-starting a mentorship program for senior-junior mentoring. + + At N0H4TS, he is the partnerships lead, overseeing fundraising and partnership related + collaborations between N0H4TS and other public and private organisations. ++
+ +~ talk title + +talking to (and hacking) the logic of the blockchain world! + + +~ talk sypnosis + +With the rise of buzzwords like Web3, blockchain, smart contracts, and NFTs, have you ever +wondered what the technology behind them is and how it works? + +In this workshop, we'll explore how the blockchain functions and how we can interact with it. +We'll also explore the cybersecurity concerns surrounding this technology and examine common +vulnerabilities that hackers exploit to access large sums of money. + +
+ +~ about speaker + +++ + +< go back ++
+ + + + coming soon + + + ++