upvote
i still have mine too! managed to talk to the microcontroller and dump its firmware, but didn't know enough about how to make it arbitrarily run code without worrying about ruining it all
reply
Appreciate the (unaffiliated) shout out! No comment on the drive recovery idea...

The fundamentals in the article are all relevant to the hard drive challenge, though the actual multi-step solution to our CTF is rather different.

If hacking hard drives sounds intriguing to you, we're hiring reverse engineers and security researchers! See our whoishiring posts and careers page for details:

- https://news.ycombinator.com/item?id=47977643

- https://redballoonsecurity.com/careers/

Be sure to mention Hacker News if you apply.

reply
As a data point for anyone curious, they're US based ("Midtown West in New York City") and their careers page mentions the roles are all in-office ones.

Ah well. ;)

reply
I'm glad you all are still doing this challenge. Ang handed one to me at Defcon 6 or 7 years ago and it's one of the most interesting challenges I've ever attempted.

Didn't finish it but learned a ton.

For anyone reading, Red Balloon is a great place with great people and I highly recommend anyone remotely interested give them a look.

reply
The Red Balloon website looks AI generated.
reply
1) so what? 2) evidence? 3) it's very obviously a wordpress site using elementor 4) the content really hasn't changed a ton in the last 10 years or so as far as I can tell 5) again, so what?
reply
May I have a challenge drive just for the challenge (not interested in switching jobs)?
reply