Has anyone analyzed these captures or know the details someother way - Does CTF traffic only have attack traffic or does it contain benign traffic as well? In a CTF contest environment I am expecting that all the machines would be trying to attack some machine and capture the goal. If there is benign traffic, what is that for? Any details is much appreciated.
Thanks On Thu, Sep 10, 2009 at 5:27 PM, kowsik <[email protected]> wrote: > 7GB and 25 million packets of defcon 17 ctf pcaps now on > http://www.pcapr.net/forensics. > > Enjoy, > > K. > --- > http://labs.mudynamics.com > http://twitter.com/pcapr > > ----------------------------------------------------------------- > Securing Your Online Data Transfer with SSL. > A guide to understanding SSL certificates, how they operate and their > application. By making use of an SSL certificate on your web server, you can > securely collect sensitive information online, and increase business by > giving your customers confidence that their transactions are safe. > http://www.dinclinx.com/Redirect.aspx?36;5001;25;1371;0;1;946;9a80e04e1a17f194 > > > ----------------------------------------------------------------- Securing Your Online Data Transfer with SSL. A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe. http://www.dinclinx.com/Redirect.aspx?36;5001;25;1371;0;1;946;9a80e04e1a17f194
