HackingDept
@hacking_dept
ID: 1052998537519206401
https://hackingdept.com/ 18-10-2018 19:03:09
38 Tweet
87 Takipçi
44 Takip Edilen
Find out who made it - Will these top teams regain control? Don't miss the final #HackASat event Aug. 7-9. #LaunchDotCom PlaidCTF Dragon Sector p4 ADDVulcan 🏴 CTF Team PFS FluxFingers Eat Sleep Pwn Repeat RedRocket.Club || Aerospace Village DEF CON Defense Digital Service Air Force Research Lab - AFRL
As every year, we organise a #CTF for you to play. This time, Oh My Hack is our host and Huawei Polska is our sponsor. Everyone will have fun - expect tough challenges for elite hackers, and easier tasks for beginners. Register at omh2021.p4.team. CTF starts in 9 days!
Once again, we have teamed up with Dragon Sector to participate in the Hack-A-Sat, a space security CTF contest. This year we continue to prove that Poland Can Into Space and now we won the qualifications 🥇. Wish us luck in the finals! 🇵🇱🚀🌌 x.com/hack_a_sat/sta…
Nasz CTF startuje za niecałe 30 min, jeżeli chcesz zgarnąć nasze gadżety spróbuj swoich sił na: cybersec-ctf.hackingdept.com A jeżeli jesteś na European Cybersecurity Forum - CYBERSEC #CS22_EXPO wpadnij i się przywitaj :)
Winner winner chicken dinner 🦆Poland stronk 🇵🇱 💪 Once again we won Hack-A-Sat quals 🚀 together with Dragon Sector and friends! #HackASat3 🛰️
The best feature of the decompiler is one that spawns random processes and gives you a heart attack. Check out our story on how to do RCE in JEB decompiler - JEB Decompiler - running on Java 18: blog.stmcyber.com/how-to-get-a-h…
Third time's a charm! Once again p4 and Dragon Sector have joined forces as the Poland Can Into Space team to conquer space 🇵🇱🚀🌌 and this time we did🏆! We won Hack-A-Sat, the space security competition! Thanks to🥈SpaceBitsRUs and🥉SolarWine for a fierce fight!
Our pentesters Stanisław Koza and Jakub Sajniak (Jakub Sajniak) found another high vuln in the Cisco product. It was marked CVE-2023-20211 and it allows any auth user to extract any info from the Cisco Unified Communications Manager using SQLi. Our PoC: blog.stmcyber.com/vulns/cve-2023…
We are releasing the first wave of vulnerabilities targeting PAX Technology, Inc (North America) PAX Android POS terminals. The list includes pre-auth RCE on the root account by exploiting a hidden bootloader functionality via USB. You can expect more POS CVEs soon™ :) blog.stmcyber.com/pax-pos-cves-2…