Announcement: Second challenge update!
### New challenge
* __SysIA__: An easy good old PHP challenge ;)
### New hints/mini-challenges
* __Intrusion (hint)__: A hint and a challenge? What more can you ask for?
* __DroneWars (hint)__ _x2_: More hints in easy challenges of course!
_By the way: No speed award for these ones ;)_
### A last hint for today
* __CryptoBootLoader__: _A friend informs you that extracted files can be used to boot a system without asking for a password in the boot sequence. The encryption keys are probably contained in these files.
In particular the **MLO** file is a standard file that calls the image **u-boot.img** which seems non-standard.
Presumably the u-boot image relies on information removed from an **env** file to decipher the **zimage** (kernel image), the **dtb** (hardware-related parameters that are passed to the kernel) as well as the **ramdisk** (file system) to complete the boot sequence._
See other news ...