HackingDept (@hacking_dept) 's Twitter Profile
HackingDept

@hacking_dept

ID: 1052998537519206401

linkhttps://hackingdept.com/ calendar_today18-10-2018 19:03:09

38 Tweet

87 Takipçi

44 Takip Edilen

p4 (@p4_team) 's Twitter Profile Photo

We still don't know how the final scoreboard looks like, but our on-orbit challenge payload/plan was the best and it's going to be executed tonight on a real satellite making a photo of the moon :). We can now definitely say that #PolandCanIntoSpace 🇵🇱🚀🌌🌙

We still don't know how the final scoreboard looks like, but our on-orbit challenge payload/plan was the best and it's going to be executed tonight on a real satellite making a photo of the moon :).
We can now definitely say that  #PolandCanIntoSpace 🇵🇱🚀🌌🌙
HackingDept (@hacking_dept) 's Twitter Profile Photo

Our friend from STM Solutions @_mzer0 has released a cool open source tool for searching and pwning Java RMI. It seems to work really nice :) github.com/STMSolutions/R…

STM Cyber (@stm_cyber) 's Twitter Profile Photo

Helpful collection of #Excel4.0 functions for #RedTeam and #BlueTeam. Check out our #github: github.com/STMSolutions/A… #pentest

p4 (@p4_team) 's Twitter Profile Photo

As every year, we organise a #CTF for you to play. This time, Oh My Hack is our host and Huawei Polska is our sponsor. Everyone will have fun - expect tough challenges for elite hackers, and easier tasks for beginners. Register at omh2021.p4.team. CTF starts in 9 days!

As every year, we organise a #CTF for you to play. This time, <a href="/OMHconf/">Oh My Hack</a> is our host and <a href="/PolskaHuawei/">Huawei Polska</a> is our sponsor. Everyone will have fun - expect tough challenges for elite hackers, and easier tasks for beginners. Register at omh2021.p4.team. CTF starts in 9 days!
p4 (@p4_team) 's Twitter Profile Photo

Once again, we have teamed up with Dragon Sector to participate in the Hack-A-Sat, a space security CTF contest. This year we continue to prove that Poland Can Into Space and now we won the qualifications 🥇. Wish us luck in the finals! 🇵🇱🚀🌌 x.com/hack_a_sat/sta…

Once again, we have teamed up with <a href="/DragonSectorCTF/">Dragon Sector</a> to participate in the <a href="/hack_a_sat/">Hack-A-Sat</a>, a space security CTF contest. This year we continue to prove that Poland Can Into Space and now we won the qualifications 🥇. Wish us luck in the finals! 🇵🇱🚀🌌
x.com/hack_a_sat/sta…
STM Cyber (@stm_cyber) 's Twitter Profile Photo

Last weekend we had the pleasure 😀 of hosting our friends from p4 who participated in the #GoogleCTF challenge⌨🧠. Congratulations on your 8th position in the competition ✊🦾✊. Our new office has survived a trial by fire🥷.

p4 (@p4_team) 's Twitter Profile Photo

Second year in a row p4 and @dragonsectorctf have joined forces as the Poland Can Into Space team to conquer space 🇵🇱 🚀 🌌 and once again we have finished 🥈 in a space security Hack-A-Sat competition! Congrats to 🥇 SolarWine and 🥉DiceGang. #zawszedrudzy

Second year in a row <a href="/p4_team/">p4</a> and @dragonsectorctf have joined forces as the Poland Can Into Space team to conquer space 🇵🇱 🚀 🌌 and once again we have finished 🥈 in a space security <a href="/hack_a_sat/">Hack-A-Sat</a>  competition! Congrats to 🥇 <a href="/solarwine_ctf/">SolarWine</a> and 🥉<a href="/dicegangctf/">DiceGang</a>.
#zawszedrudzy
HackingDept (@hacking_dept) 's Twitter Profile Photo

Jeżeli jesteś studentem spróbuj swoich sił! Mija ostatnia szansa aby się zarejestrować i wziąć udział w konkursie i konferencji. Jeżeli nie możesz przyjechać, a chcesz zmierzyć się z zadaniami, nic straconego, zarejestruj się na wydarzenie online.

HackingDept (@hacking_dept) 's Twitter Profile Photo

Nasz CTF startuje za niecałe 30 min, jeżeli chcesz zgarnąć nasze gadżety spróbuj swoich sił na: cybersec-ctf.hackingdept.com A jeżeli jesteś na European Cybersecurity Forum - CYBERSEC #CS22_EXPO wpadnij i się przywitaj :)

Nasz CTF startuje za niecałe 30 min, jeżeli chcesz zgarnąć nasze gadżety spróbuj swoich sił na:
cybersec-ctf.hackingdept.com

A jeżeli jesteś na <a href="/CYBERSECEU/">European Cybersecurity Forum - CYBERSEC</a> #CS22_EXPO wpadnij i się przywitaj :)
HackingDept (@hacking_dept) 's Twitter Profile Photo

Poniżej zamieszczamy częściowe wyniki konkursu CYBERSEC CTF by HackingDept #CS22_EXPO Zwycięzcom i wszystkim uczestnikom gratulujemy 💪 Mamy nadzieję, że zobaczymy się na kolejnej edycji.

Poniżej zamieszczamy częściowe  wyniki konkursu CYBERSEC CTF by HackingDept #CS22_EXPO
Zwycięzcom i wszystkim uczestnikom gratulujemy 💪 Mamy nadzieję, że zobaczymy się na kolejnej edycji.
p4 (@p4_team) 's Twitter Profile Photo

Winner winner chicken dinner 🦆Poland stronk 🇵🇱 💪 Once again we won Hack-A-Sat quals 🚀 together with Dragon Sector and friends! #HackASat3 🛰️

Winner winner chicken dinner 🦆Poland stronk 🇵🇱 💪 Once again we won <a href="/hack_a_sat/">Hack-A-Sat</a> quals 🚀 together with <a href="/DragonSectorCTF/">Dragon Sector</a> and friends! #HackASat3 🛰️
STM Cyber (@stm_cyber) 's Twitter Profile Photo

The best feature of the decompiler is one that spawns random processes and gives you a heart attack. Check out our story on how to do RCE in JEB decompiler - JEB Decompiler - running on Java 18: blog.stmcyber.com/how-to-get-a-h…

p4 (@p4_team) 's Twitter Profile Photo

Third time's a charm! Once again p4 and Dragon Sector have joined forces as the Poland Can Into Space team to conquer space 🇵🇱🚀🌌 and this time we did🏆! We won Hack-A-Sat, the space security competition! Thanks to🥈SpaceBitsRUs and🥉SolarWine for a fierce fight!

Third time's a charm! Once again <a href="/p4_team/">p4</a> and <a href="/DragonSectorCTF/">Dragon Sector</a> have joined forces as the Poland Can Into Space team to conquer space 🇵🇱🚀🌌 and this time we did🏆! We won <a href="/hack_a_sat/">Hack-A-Sat</a>, the space security competition! Thanks to🥈SpaceBitsRUs and🥉<a href="/solarwine_ctf/">SolarWine</a> for a fierce fight!
p4 (@p4_team) 's Twitter Profile Photo

Get ready, set, hack! ctf.p4.team just hit the ground! ⏰ Less than 24hrs to uncover flags, conquer snacks & tackle tricky AI challenges 🤖. This year we replaced all boring crypto puzzles with 2 zajebiste tasks.

Get ready, set, hack! ctf.p4.team just hit the ground! ⏰ Less than 24hrs to uncover flags, conquer snacks &amp; tackle tricky AI challenges 🤖. This year we replaced all boring crypto puzzles with 2 zajebiste tasks.
STM Cyber (@stm_cyber) 's Twitter Profile Photo

Our pentesters Stanisław Koza and Jakub Sajniak (Jakub Sajniak) found another high vuln in the Cisco product. It was marked CVE-2023-20211 and it allows any auth user to extract any info from the Cisco Unified Communications Manager using SQLi. Our PoC: blog.stmcyber.com/vulns/cve-2023…

STM Cyber (@stm_cyber) 's Twitter Profile Photo

We are releasing the first wave of vulnerabilities targeting PAX Technology, Inc (North America) PAX Android POS terminals. The list includes pre-auth RCE on the root account by exploiting a hidden bootloader functionality via USB. You can expect more POS CVEs soon™ :) blog.stmcyber.com/pax-pos-cves-2…