POPULARITY
In this episode of the PowerShell Podcast, we take a detour from our typical PowerShell conversations to explore the fascinating world of game hacking with backend services developer Mateus Pimentel. Mateus shares his journey from crafting bots for MMORPGs to reverse engineering games and ultimately working in online services for a major gaming company.We discuss his early experiences hacking Tibia, how he overcame being hacked himself as a kid, and how those formative experiences shaped his approach to software development and cybersecurity. Mateus also dives into powerful learning experiences from hacking games, participating in Capture the Flag competitions, and avoiding the dark paths that lure many curious technologists. This episode is a compelling exploration of hacking culture, ethics, and personal transformation. Topics covered: From game hacking to working at a gaming company Mateus' early adventures reverse-engineering Tibia Lessons learned from being hacked as a kid Ethical hacking, personal growth, and career evolution The overlap between game hacking and cybersecurity Capture the Flag (CTF) competitions and their career value Understanding system protocols and reverse engineering Reflections on following your curiosity and avoiding burnout Notable quote: “Follow your passion. If it's fun, you'll learn 10 times faster.” Bio and Links: Mateus Pimentel is a software developer with a passion for software architecture, game modding and solving complex problems. From reverse engineering MMORPGs as a teenager to helping secure one of the gaming industry's most ambitious projects at major gaming company, Mateus has cultivated deep technical skills grounded in a strong ethical framework. His journey from underground hacker to professional developer offers a unique and inspiring perspective on how curiosity and integrity can guide a meaningful career in tech. Follow Mateus on LinkedIn: https://www.linkedin.com/in/pimentelmateus/ Connect with Andrew: https://andrewpla.tech/links Catch PowerShell Wednesdays weekly at 2 PM EST on discord.gg/pdq The PowerShell Podcast hub: https://pdq.com/the-powershell-podcast Darza's Dominion Hacked: https://www.youtube.com/watch?v=ipqge4aJt3U Mystera Reborn Hacked: https://youtu.be/Gg6owdR_7h8?si=1Uk0a8RW9czs0TCm Using Remote Vision to watch a Player Battle: https://www.youtube.com/watch?v=poDkWlR-1ks Fractured Online Gold Machine: https://youtu.be/EIHJBdrr0Ac?si=Wis9DGinI5EKuN0O The PowerShell Podcast Hub: https://pdq.com/the-powershell-podcast The PowerShell Podcast on YouTube: https://youtu.be/8cxtg4QQjZQ
Podcast: (CS)²AI Podcast Show: Control System Cyber SecurityEpisode: 124: Capture the Flag: Transforming Cybersecurity Training with Kenneth WarrenPub date: 2025-01-21Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDerek Harp sits down with Kenneth Warren, Staff OT and Offensive Security Engineer at GRIMM Cyber, to discuss how gamification and Capture the Flag (CTF) competitions are revolutionizing cybersecurity training. Recorded live at Hack the Capitol 7.0, this conversation explores how CTFs and cyber ranges create safe, hands-on environments for learning offensive and defensive cybersecurity skills.Kenneth explains how CTFs offer opportunities to tackle real-world scenarios, from navigating complex networks to interacting with industrial control protocols. Whether you're an experienced professional or a newcomer to the field, CTFs provide a unique way to build and refine your skills. He also highlights how gamification reaches audiences that traditional training might miss, making learning engaging and accessible.This episode provides insights into the growing role of gamified learning in cybersecurity and how it's inspiring the next generation of professionals. Discover how these competitions foster collaboration, creativity, and innovation in a rapidly evolving industry.The podcast and artwork embedded on this page are from Derek Harp, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Control System Cyber Security Association International: (CS)²AI
Derek Harp sits down with Kenneth Warren, Staff OT and Offensive Security Engineer at GRIMM Cyber, to discuss how gamification and Capture the Flag (CTF) competitions are revolutionizing cybersecurity training. Recorded live at Hack the Capitol 7.0, this conversation explores how CTFs and cyber ranges create safe, hands-on environments for learning offensive and defensive cybersecurity skills.Kenneth explains how CTFs offer opportunities to tackle real-world scenarios, from navigating complex networks to interacting with industrial control protocols. Whether you're an experienced professional or a newcomer to the field, CTFs provide a unique way to build and refine your skills. He also highlights how gamification reaches audiences that traditional training might miss, making learning engaging and accessible.This episode provides insights into the growing role of gamified learning in cybersecurity and how it's inspiring the next generation of professionals. Discover how these competitions foster collaboration, creativity, and innovation in a rapidly evolving industry.
In this episode of the mnemonic security podcast, Robby is joined by Eirik Nordbø and Marius Kotlarz from Equinor, as well as Haakon Staff from mnemonic.Together, they discuss the world of Capture the Flag (CTF) competitions, exploring their origins, structure, and benefits. CTFs, as they explain, are “hacking” contests featuring challenges such as cryptography and reverse engineering, where participants solve tasks to uncover "flags" and earn points.The discussion highlights the educational value of CTFs, particularly in helping developers, pentesters, and other IT professionals refine their skills and master advanced techniques. The group also addresses the logistical challenges of hosting a CTF—such as the Equinor CTF—from infrastructure setup to stress testing, while emphasizing the passion and expertise required to organize a successful event. Finally, they explore how CTFs can serve as a valuable recruitment tool for identifying and attracting top security talent.Send us a text
Key Points Discussed:Defining Ethical Hacking: Ethical hackers use their skills to identify and report vulnerabilities, often to enhance cybersecurity in various capacities, including voluntary work, bug bounty programs, or professional roles.Research Focus: Dr. Kranenbarg's studies highlight a significant overlap between positive and negative cyber behaviors, particularly among IT students, and explore how individuals transition toward ethical hacking.Ethical Hacking as a Pathway:Early positive experiences, such as reporting vulnerabilities to schools or organizations, can strongly influence individuals toward ethical hacking.Responses from organizations play a critical role—positive reinforcement encourages further ethical behavior, while negative experiences can deter individuals.Challenges in Defining Ethics:Ethical hackers themselves debate the boundaries of what constitutes ethical behavior, such as whether making vulnerabilities public is acceptable if organizations fail to act.The term "ethical hacker" is often contentious within the community.Role of Education: Schools struggle to address and guide ethical behavior among IT students effectively. Clear vulnerability disclosure policies and ethics education in IT programs are crucial.Future Research Directions: Dr. Kranenbarg plans to conduct life-history interviews with hackers to better understand their pathways and influences toward ethical behavior.About our Guest:Dr Marleen Weulen Kranenbarghttps://research.vu.nl/en/persons/marleen-weulen-kranenbarg Papers or Resources Mentioned:Weulen Kranenbarg, M. (2018). Cyber-offenders versus traditional offenders: An empirical comparison. Vrije Universiteit Amsterdam. Retrieved from https://research.vu.nl/en/publications/cyber-offenders-versus-traditional-offenders-an-empirical-comparisonWeulen Kranenbarg, M., Ruiter, S., & Nieuwbeerta, P. (2018). Cyber-offending and traditional offending over the life-course: An empirical comparison. Crime & Delinquency, 64(10), 1270–1292. https://doi.org/10.1177/0011128718763134Weulen Kranenbarg, M., Holt, T. J., & van Gelder, J.-L. (2021). Contrasting cyber-dependent and traditional offenders: A comparison on criminological explanations and potential prevention methods. In J. van Gelder, H. Elffers, D. Reynald, & D. Nagin (Eds.), Routledge International Handbook of Criminology and Criminal Justice Studies (pp. 234–249). Routledge. Retrieved from https://research.vu.nl/en/publications/contrasting-cyber-dependent-and-traditional-offenders-a-comparisoWeulen Kranenbarg, M., & Noordegraaf, J. (2023). Why do young people start and continue with ethical hacking? A qualitative study on individual and social aspects in the lives of ethical hackers. Criminology & Public Policy, 22(3), 465–490. https://doi.org/10.1111/1745-9133.12640Additional Resources:Capture the Flag (CTF) events:Hack the Box - A popular online platform offering a variety of CTF challenges to test and improve cybersecurity skills.https://www.hackthebox.comNorthSec - A popular in-person CTF competition designed for everyone excited about cybersecurity.https://nsec.ioBug Bounty Programs:HackerOne - A leading bug bounty platform connecting ethical hackers with organizations to find and fix vulnerabilities.https://www.hackerone.comBugcrowd - A platform that hosts bug bounty programs for a wide range of companies and industries.https://www.bugcrowd.com
Linktree: https://linktr.ee/AnalyticNotorious Mass Effect: XDefiant Season 1 BreakdownAnalytic Dreamz analyzes everything new in XDefiant's explosive Season 1! Gear up for a deep dive into the fresh content, including:New Faction: The GSK joins the fray, featuring familiar faces from Rainbow Six Siege – Bandit, Jäger, and Blitz – with abilities adapted for XDefiant's fast-paced action.Weapon Arsenal Expands: Master the LVOA-C assault rifle's high fire rate, the L115 sniper rifle's balanced damage, and the close-quarters power of the Sawed-off Shotgun.Mastery Colors: Flaunt your skills with new Titanium, Violet, Azure, and Prisma mastery colors.Ranked Play Arrives: Climb the competitive ladder in the 4v4 Ranked Playlist featuring Ocuppy, Domination, Zone Control, and Escort. Prove your mettle through adjusted rules and seven tiers, from Bronze to Legends.New Map – Reimagined: Explore the familiar yet revamped Clubhouse map, inspired by Rainbow Six Siege, with strategic adjustments to key areas.Support Your Favorite Creators: Show your love for XDefiant content creators through in-game purchases.Patch Notes Rundown: Analytic Dreamz breaks down key balance changes, including ability adjustments, the introduction of Capture the Flag (CTF), and improved sniper flinch. Plus, discover bug fixes for weapons, devices, and social features.Beginner's Bootcamp: Dive into essential tips for XDefiant newcomers, covering faction mastery, settings optimization, weapon customization, flanking tactics, map knowledge, teamwork, advanced movement, aiming strategies, and more.Reviews Roundup: Analytic Dreamz analyzes critic reception, highlighting the game's praised gunplay and core mechanics alongside discussions on content and features. Ratings range from 6 to 8 out of 10.Don't miss this segment for a comprehensive look at XDefiant's Season 1 and everything it brings to the arena!Support this podcast at — https://redcircle.com/analytic-dreamz-notorious-mass-effect/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
In the August 28th episode of the Storm Watch podcast, the hosts discussed various cybersecurity topics and welcomed a new guest, Donna, the director of product design at Grey Noise. Donna shared her experience attending Blue Team Con, a conference for cybersecurity defenders. She emphasized the importance of learning directly from the cybersecurity community to improve Grey Noise's overall user experience. Glenn, another host, also attended the conference and praised its organization, variety of talks, and friendly atmosphere. The hosts then discussed a recent Sophos report on cybersecurity trends, highlighting the report's engaging writing style and informative content. They also touched on a misleading headline about Russia hacking Poland's train rail network, clarifying that it was not a cyber attack but rather a simple radio frequency interference that caused the trains to stop. The hosts expressed concern about the vulnerability of modern systems to such basic attacks. The conversation shifted to the impact of ransomware attacks on businesses, with the hosts mentioning two Danish cloud providers that went out of business due to ransomware incidents. They emphasized the importance of taking cybersecurity seriously, as even well-prepared businesses can be affected by unforeseen threats. Lastly, the hosts discussed a recent Capture the Flag (CTF) competition organized by Grey Noise. They praised the event's organization and shared some interesting stories from the participants, including a real-life open-source intelligence gathering situation. The CTF event showcased the creativity and skills of the cybersecurity community and provided valuable learning experiences for the participants. Learn more about GreyNoise >>
In this Storm Watch episode the hosts discuss various topics related to cybersecurity, vulnerabilities, and attacker activity. The episode features Kimber, a product manager at GreyNoise, and Glenn Thorpe, the director of security research and detective engineering at Grey Noise. The team shares their experiences and takeaways from attending Black Hat DEF CON, a cybersecurity conference held in Las Vegas. During the conference, the hosts noticed an increased focus on API and supply chain security, particularly among startups. They also observed a growing interest in healthcare security, with discussions centered around protecting hospitals from ransomware attacks and implementing canaries to detect such attacks faster. The hosts also mention the popularity of the AI Village at DEF CON, as well as the Policy Village, which aims to protect the cybersecurity community and researchers. The podcast also covers the GreyNoise Capture the Flag (CTF) event, where participants were challenged to solve various cybersecurity puzzles. The hosts express their admiration for the effort put into designing the challenges and their interest in hearing participants' reactions. They also discuss a new feature in GreyNoise that allows users to set up alerts based on specific tags, making it easier to monitor and receive updates on particular vulnerabilities. Overall, this episode highlights the importance of staying informed about the latest trends and developments in cybersecurity, as well as the value of participating in events like Black Hat DEF CON and Grey Noise CTF to learn and engage with the cybersecurity community. Join our Community Slack >> Learn more about GreyNoise >>
DEF CON is the world's leading hacking conference, about to have its 31st event in Las Vegas, August 10-13, 2023. For the second year in a row, Quantum Village will be helping attendees engage with quantum technologies and understand the cybersecurity impacts they will have. There's even a Quantum Capture the Flag (CTF) competition! Join Host Konstantinos Karagiannis (a speaker at the show) for a chat with Mark Carney and Victoria Kumaran to learn how you can become a part of this exciting community. For more on Quantum Village, visit https://quantumvillage.org/. For more on DEF CON, visit https://defcon.org/index.html. Visit Protiviti at www.protiviti.com/postquantum to learn more about how Protiviti is helping organizations get post-quantum ready. Follow host Konstantinos Karagiannis on Twitter and Instagram: @KonstantHacker and follow Protiviti Technology on LinkedIn and Twitter: @ProtivitiTech. Contact Konstantinos at konstantinos.karagiannis@protiviti.com. Questions and comments are welcome! Theme song by David Schwartz, copyright 2021. The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries. None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.
In this episode of the Storm Watch podcast, the hosts discuss their recent vacations and the mandatory two-week shutdown at GreyNoise. The conversation then shifts to the MOVEit software and its increasing number of CVEs. Kimber suggests that the surge in CVEs might be due to researchers taking a closer look at MOVEIt for the first time, as it is a critical software used in government entities. The hosts also discuss the possibility that similar software might become a focus for attackers in the coming months. Next, the hosts talk about the lack of new tags due to their vacation and a recent bump in Mirai activity. They mention a double-encoded URL tag that has doubled the number of IP addresses, but they don't have any hypotheses about the reasons behind it. They also touch on the ability of GPT to create Python notebooks on the fly and the potential security risks associated with it. Finally, the hosts discuss NoiseFest, an upcoming event celebrating all things GreyNoise. Kimber shares her excitement about the Capture the Flag (CTF) competition that will take place during the week of Black Hat and DEF CON. Join our Community Slack >> Learn more about GreyNoise >>
Guest: Greg Porterfield, Senior Security Consultant at SET Solutions [@setsolutionsinc]On LinkedIn | https://www.linkedin.com/in/gporterfield/On Twitter | https://twitter.com/GregPorterfieldHost: Phillip WylieOn ITSPmagazine
Guest: Greg Porterfield, Senior Security Consultant at SET Solutions [@setsolutionsinc]On LinkedIn | https://www.linkedin.com/in/gporterfield/On Twitter | https://twitter.com/GregPorterfieldHost: Phillip WylieOn ITSPmagazine
Dans ce sixième épisode d'Objectif CYBER, nous recevons Charlie Bromberg, Capitaine de l'équipe de Capture the Flag (CTF) de Capgemini (Les Capgemini Aces of Spades). Qu'est-ce qu'un CTF, en quoi disposer d'une équipe semi-pro est un atout de taille pour accompagner les organisations dans la sécurisation de leur périmètre numérique, quels sont les profils concernés et quels seront les challenges à relever dans les années à venir … il répond à toutes vos questions !
Jonathan Tanner of Barracuda talks about his time moving up the ladder at Barracuda, how he still enjoys computer science competitions like DEFCON Wireless Capture the Flag (CTF), and Barracuda's revolutionary malware detection ATP platform he built. – Don't miss our next Cyber Work LIVE: https://www.infosecinstitute.com/events/– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast0:00 - Intro3:04 - Origin story in cybersecurity 5:45 - Major accomplishments and moving up with Barracuda7:55 - Daily work as senior security researcher 10:36 - Was this always what you were interested in?12:42 - How did you expand your skills and position14:30 - Cyber security resume tips17:20 - Becoming a cybersecurity professional19:01 - How can hackathons and conferences help you?22:33 - Improving the hiring process25:33 - How to prepare for cyber security interview27:46 - Working long term with a tech company29:27 - What's next for you at Barracuda?30:26 - Where should security professionals begin?33:46 - What's happening at Barracuda34:33 - Where can I find out more about you?35:06 - Outro About InfosecInfosec believes knowledge is power when fighting cybercrime. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and privacy training to stay cyber-safe at work and home. It's our mission to equip all organizations and individuals with the know-how and confidence to outsmart cybercrime. Learn more at infosecinstitute.com.
In this action-packed episode, our host TJ Null sits down with Alethe Denis, to talk social engineering, red team, blue team, raising chickens, and everything in between! Learn why Alethe was honored by DEF CON with a Black Badge following her win of the Social Engineering Capture the Flag (CTF) contest at DEF CON 27. She shares her favorite tools for social engineering campaigns as well as the best way to gain trust and get the answers you need in a phishing campaign. Alethe breaks down what it takes to be a world-class social engineer. She also touches on her work with the Innocent Lives Foundation (ILF) and what you can do to help.
Unfortunately, Zardus’ machine blew up after the first 16 minutes of recording (LINUX!), so we lost his good audio, and have to go with lower quality audio for the first 16 minutes. Sorry! Youtube Video of podcast Shownotes and Links In this episode of CTF Radiooo, adamd and Zardus answer the question that we get frequently: How to get into Capture the Flag (CTF) cybersecurity competitions? We tell our “orgin story” about how we both got into CTFs at UCSB and with Shellphish (Zardus’ is particularly great). We also point people to resources where they can get into CTFs. The best way into CTFs is to start playing, so do it! Links to Explore CTFs: The art of sniffing: dsniff When are CTFs? CTF Time OpenToAll CTF team that is, as the name says, open to all! Proper preparation prevents poor performance: wargames to practice OverTheWire, one of our favorite sets of wargames Hack on some binaries with pwnable.kr, by our friend daehee Go from a white-belt to a yellow-bet on exploitation with pwn.college, by our very own Zardus and kanak
Youtube Video of podcast Shownotes and Links In this initial episode of CTF Radiooo, adamd and Zardus answer the question: What is Capture the Flag (CTF)? And no, we’re not talking about a physical in-person CTF, or a first-person shooter CTF (ala Quake or Unreal). We’re talking about the cybersecurity hacking competitions known as Capture the Flag, where hackers from around the world compete to solve security challenges and develop their security skills. Interesting Links to Explore: Capture The Flag (Wikipedia) What is Capture the Flag (from CTF Time) CTFd’s What is CTF Why CTFs are Awesome and Why CTFs are Terrible, both from our friend LiveOverflow DEF CON, the birthplace of DEF CON CTF
Since we are now getting into the summer of the Capture the Flag (CTF) within InfoSec, we discuss our opinions on the effectiveness of the CTF. This does involve the shameless promotion of our favorite CTF, OpenSOC from Recon Infosec. Stay safe, wear a mask, and go forth to find badness.Support the show (https://www.patreon.com/bePatron?u=28069055)
People love Capture the Flag (CTF) competitions for being an excellent way to put your hacking skills to the test – not only is it a lot of fun, but it forces you to use the skills you may learn in a classroom or course setting to real-world situations. Kaitlyn Bestenheider, analyst at Tevora, dives into her passion for cryptography and CTFs, core skills needed, and shares her advice for others looking to enter the field.
People love Capture the Flag (CTF) competitions for being an excellent way to put your hacking skills to the test – not only is it a lot of fun, but it forces you to use the skills you may learn in a classroom or course setting to real-world situations. Kaitlyn Bestenheider, analyst at Tevora, dives into her passion for cryptography and CTFs, core skills needed, and shares her advice for others looking to enter the field.
In this episode we interview the RedStoneCTF (Capture the Flag) team and discuss their recent experiences attending the BSides Asheville NC Security event. BSides are held around the world, and there is often one every Saturday somewhere on the planet. First we learn about the team which is composed of: R3dC0m3t – Cyptanalyst, professionally an agile scrum-master. … Continue reading TE23: BSides Security Conferences and Capture the Flag (CTF)
This week's episode comes (almost) live from the Black Hat hacking conference in Las Vegas. We start out with a discussion about the Capture the Flag (CTF) challenge that the WatchGuard Threat Lab released for the second year in a row and then jump right in to our favorite talks from this year's Black Hat including important takeaways for the future of security.
The “Wild Boys” (Albert, Mike, and the main host of Bad Gamers Anonymous, Bad Gamer Crowley) start the first of THREE episodes dedicated to Chapter 0003 of Ready Player One! Join us for a fun trip down memory lane where we talk about really weird things like videophiles, Vulcans, and Duran Duran! We then hit the classic coin ops like Contra, Ikari Warriors, Golden Axe, and the “Zeppo Marx” of the bunch, Heavy Barrel. We kind of end on Tron but see the show notes below for the full list damage done: News from the front lines! Ernie Cline will NOT be at Classic Game Fest this year Albert is unwavered (lies) and still going Betamax (1975 - 2002) and Laserdisc (1978 - 2001) VHS vs Betamax vs Laserdisc Videophiles in the 80's and 90's were weird Who lets their kid watch Conan the Barbarian?? Any guesses on who still owns a VHS player? Dragon Magazine (1976 - 2007) Tabletop gamers > Athletes Tabletop gamers > Sk8ters Capture the Flag (CTF) and DeathMatch (DM) Origins and Bannercatch (1984) LAN parties and early online gaming The Pentium Club or “The P-Club” or How-to-lose-your-girlfriend-in-one-weekend Club Vulcans and Dark Elves 30 Seconds to Vulcan Prime vs. Kelvin (NOT Transformers) GVOAT: Greatest Vulcan of All Time Drizzt Do'Urden and Forgotten Realms Like Dungeon and Dragons? Wanna be a Podcaster? Call me. “Wild Boys” by Duran Duran (1984) Duran Duran is one of the greatest bands of the 80's (Albert) Great song, terrible video? The ulterior motives of the music video Cassette Tapes The importance of Scotch® tape The importance of the pencil Saving video games to cassette tapes or how to drive yourself to the brink of suicide Contra (1987), Golden Axe (1989), Heavy Barrel (1987), Smash TV (1990), and Ikari Warriors (1986) Albert can't get over the horrible background stories Hosts: Albert “Ax Battler” Padilla Mike “Gilius Thunderhead” Rondeau Bad Gamer “Tyris Flare” Crowley Like us, follow us, pay us here: Instagram: @TheBasementRPO Twitter: @TheBasementRPO Facebook: /TheBasementRPO Patreon: patreon.com/TheBasementRPO TeePublic:http://tee.pub/lic/mjtTM-nrguo Be kind, rewind!
Rachel is the Co-founder and CEO of SocialProof Security where she focuses on helping people and companies keep their data safe through social engineering awareness. Rachel was also a winner of the Social Engineering Capture the Flag (CTF), at DEFCON, 2 years in a row using mainly social media to infiltrate companies. As Chair of the Board of Women in Security and Privacy, I advocate for women in technology, specifically the growing field of cyber security and privacy. Rachel on Twitter - @RachelTobac Rachel on LinkedIn - Rachel Tobac SocialProof Security website - SocialProof Security Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe SaveSave SaveSave
In dieser Folge teilt Ben Stock (@kcotsneb) vom Center for It-Security, Privacy & Accountability seine Erfahrungen aus 11 Jahren CTFs. Der Beitrag Erfahrungen aus 11 Jahren Capture the flag (CTF) hacking contests erschien zuerst auf Alsbih.
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Walker-Wiens-Machine-vs-Machine-DARPA-Fully-Automated-CTF.pdf Machine vs. Machine: Inside DARPA’s Fully Automated CTF Michael Walker Program Manager, DARPA/I2O Jordan Wiens CTF A(p|nthro)pologist @vector35.com For 22 years, the best binary ninjas in the world have gathered at DEF CON to play the world’s most competitive Capture-the-Flag. At DEF CON 24, DARPA will challenge machines to play this game for the first time, with the winner taking home a $2 million prize. This talk will include a first public look at the machines, teams, technology, and visualization behind Cyber Grand Challenge. The technology: machines that discover bugs and build patches? We’re bringing our qualifier results to show just how real this is. The teams: we’ll talk about the finalists who prevailed to make it to the CGC final round. Visualization: the product of CTF players working with game designers, this talk will include a live interactive demo of a graphical debugger for everyone that will let an audience follow along in real time. The machines: we’re bringing high performance computing to the DEF CON stage. The event: In 2016, machines will Capture the Flag! Follow DARPA Cyber Grand Challenge on Twitter: #DARPACGC Mike Walker joined DARPA as a program manager in January 2013. His research interests include machine reasoning about software in situ and the automation of application security lifecycles. Prior to joining DARPA, Mr. Walker worked in industry as a security software developer, Red Team analyst, enterprise security architect and research lab leader. As part of the Computer Science Corporation "Strikeforce" Red Team, Mr. Walker helped develop the HEAT Vulnerability Scanner and performed Red Team engagements. Serving as a principal at the Intrepidus Group, Mr. Walker worked on Red Teams that tested America's financial and energy infrastructure for security weaknesses. Also, on the DARPA SAFER Red Team, Mr. Walker discovered flaws in prototype communications technologies. Mr. Walker has participated in various roles in numerous applied computer security competitions. He contributed challenges to DEF CON Capture the Flag (CTF) and competed on and led CTF teams at the highest levels of international competition. Mr. Walker was formerly a mentor of the Computer Security Competition Club at Thomas Jefferson High School for Science and Technology (TJHSST). Jordan started his professional career at the University of Florida where he got to do a little bit of everything security related. His love of CTFs, however, drove him to a job at a government contractor where he honed his reverse engineering and vulnerability research skills. Now, his goal in life is to become a professional CTF e-sports caster so he founded a startup Vector 35 to try to get paid to do stuff with CTFs and gaming.