Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security

DEF CON "Capture the Capture The Flag" Data 107

pablos writes "Each year DEF CON hosts the famed Capture The Flag contest. Hackers from all over the world duke it out on the network for 72 hours, hacking for the title. The Shmoo Group diligently logs every packet for posterity, we "Capture the Capture The Flag." Now is your chance to download by far the most interesting, 'sploit ridden, 5.8GB of intrusion collusion ever published. Free for the bandwidth endowed, this is the ultimate IDS testbed."
This discussion has been archived. No new comments can be posted.

DEF CON "Capture the Capture The Flag" Data

Comments Filter:
  • even better (Score:5, Insightful)

    by evenprime ( 324363 ) on Tuesday October 30, 2001 @07:43AM (#2496395) Homepage Journal
    the shmoo group's data gives an idea of the type of attack tools that are most commonly used in intrusion attempts, but if you want to know the tools and techniques that are the most likely to succeed, it would be good to talk to Caezar [caezarschallenge.org] or some other member of the ghettohackers [ghettohackers.net]. After all, they are the ones who win at capture the flag year after year....

For God's sake, stop researching for a while and begin to think!

Working...