Capture The Packet
@Capturetp
Followers
2K
Following
144
Media
376
Statuses
3K
Cyber Analytics Network Forensics Skills Assessment
Joined July 2010
…please report to the Packet Hacking Village at 10AM sharp tomorrow (Sunday) morning for CTP FINALS!!! andsoitshallbe angrymarmot Squid Proxy Lovers Taint KnightSec B^2 ChatCTP The Gooberz respondo Marauders wireless shark CrowdStruck tb20 BurningWires VIMWAFFLES JustAGuy 2/2
0
0
2
The Packet Hacking Village gods have been gracious or manic, you choose. We want all of our heavy hitters to battle it out in order to be crowned the 2024 Capture The Packet champion. If you are from the following teams, please report to the Packet Hacking Village… 1/2
0
0
0
If you would like the chance to knock one of these guys off the leaderboard and compete in our Mains rounds. Be here in Packet Hacking Village 10 AM sharp. For our finalists from previous years and current leaderboard position holders, we will be starting Mains at NOON! 2/2
0
0
0
Thank you all for playing Capture The Packet: Preliminary at DEF CON 32. Our current top 10 teams are as follows: Taint andsoitshallbe wireless shark vimwaffles B^2 Spuid Proxy Lovers The Gooberz JustAGuy IPOften redbeard 1/2
0
0
0
#DEFCON32 i guess i’ll see you on saturday at 16:30 in LVCC - L2 - W222 (creator stage 4) for my talk: “decoding galah: an llm-powered web honeypot” https://t.co/A23pohhm8g
@wallofsheep
0
4
17
For the first time, researchers have demonstrated that a large portion of cryptographic keys used to protect data in computer-to-server SSH traffic are vulnerable to complete compromise. https://t.co/q2gcoUssUU
arstechnica.com
An error as small as a single flipped memory bit is all it takes to expose a private key.
0
0
2
In response to five class-action lawsuits, a Washington appeals court has decided that Honda and several other automakers did nothing wrong by storing text messages and call records from connected smartphones. https://t.co/XXCRf7m8Qx
theregister.com
Just because they store messages in a way owners can't access doesn't mean it's a privacy violation, US court rules
0
0
0
Cybersecurity researchers have developed what's the first fully undetectable cloud-based cryptocurrency miner leveraging the Microsoft Azure Automation service without racking up any charges. https://t.co/d5Clbb59Ch
thehackernews.com
Cybersecurity researchers have developed a fully undetectable cloud-based cryptocurrency miner that can operate without paying any charges.
0
0
0
DARPA plans to create wireless energy transfer infrastructure to supply near-uninterruptable power to U.S. military bases worldwide. The plan, as reported by Popular Mechanics, is to use laser technology to beam electricity around the planet. https://t.co/EQjr54Bcm3
interestingengineering.com
DARPA is developing a global laser-beam wireless energy transfer network to provide near-uninterruptable power supply to U.S. forces worldwide.
0
0
1
A popular torrenting site has become the latest victim of a high-profile data breach this year, after reports emerged suggesting a database featuring sensitive user information had leaked online. https://t.co/o45ybxuUPI
0
0
0
A vulnerability in Cisco Emergency Responder could allow an unauthenticated, remote attacker to log in to an affected device using the root account, which has default, static credentials that cannot be changed or deleted. https://t.co/0yRAaTOMkJ
sec.cloudapps.cisco.com
A vulnerability in Cisco Emergency Responder could allow an unauthenticated, remote attacker to log in to an affected device using the root account, which has default, static credentials that cannot...
0
0
0
This repository contains various ICS/SCADA/OT focused signatures and analytics. The end goal is to enable Critical Infrastructure Defenders, Intrusion Analysts, and others to implement continuous and vigilant system monitoring. https://t.co/Jg63uCXzmi
github.com
OT security monitoring #nsacyber. Contribute to nsacyber/ELITEWOLF development by creating an account on GitHub.
0
0
0
Key Group ransomware can be classified as a low-sophisticated threat actor. The ransomware samples contained multiple cryptographic mistakes that enabled EclecticIQ to create a decryption tool for this specific ransomware version. https://t.co/ES53WgKR7o
blog.eclecticiq.com
EclecticIQ researchers assess that Key Group is primarily a Russian speaking, financially motivated threat group using Telegram to negotiate ransom.
0
0
0
Researchers have discovered a new and powerful transient execution attack called 'Inception' that can leak privileged secrets and data using unprivileged processes on all AMD Zen CPUs, including the latest models. https://t.co/f79Z6FSgs2
bleepingcomputer.com
Researchers have discovered a new and powerful transient execution attack called 'Inception' that can leak privileged secrets and data using unprivileged processes on all AMD Zen CPUs, including the...
0
0
0
Hey friends, Social media lady here. Hi!!! Just now going to bed. Been up trying to figure out WTF, and sadly I have nothing to report. Stay cool, follow @defcon for the latest. Love y’all, gonna sleep, back answering your questions later
0
0
4
ANNOUNCEMENT: Due to DEF CON being temporarily paused, we’ve not been able to run the statistics for Capture The Packet. Sorry about that! Follow @defcon for info and updates; we will update with village info as soon as we have it. Thank you for being patient and awesome!
0
0
1
CAPTURE THE PACKET TEAMS!! This is the list of folks returning for mains. Keep up the good work! respondo crash HuntingButcher ATH0 claire argonaut0 LuckyBug fred orangeq Gethvi nadrojisk r0m codenamedyna jaesmash Grand_Adm1ral msbrogli
0
0
2
Capture The Packet MAINS this afternoon at the Packet Hacking Village, and going all day!
0
0
0
More Capture The Packet Preliminaries starting in 10 MINUTES at the Packet Hacking Village! Must be present to play!
0
0
0