Has anyone analyzed these captures or know the details someother way -
Does CTF traffic only have attack traffic or does it contain benign
traffic as well?
In a CTF contest environment I am expecting that all the machines would be
trying to attack some machine and capture the goal.
If there is benign traffic, what is that for?
Any details is much appreciated.

Thanks


On Thu, Sep 10, 2009 at 5:27 PM, kowsik <[email protected]> wrote:
> 7GB and 25 million packets of defcon 17 ctf pcaps now on
> http://www.pcapr.net/forensics.
>
> Enjoy,
>
> K.
> ---
> http://labs.mudynamics.com
> http://twitter.com/pcapr
>
> -----------------------------------------------------------------
> Securing Your Online Data Transfer with SSL.
> A guide to understanding SSL certificates, how they operate and their 
> application. By making use of an SSL certificate on your web server, you can 
> securely collect sensitive information online, and increase business by 
> giving your customers confidence that their transactions are safe.
> http://www.dinclinx.com/Redirect.aspx?36;5001;25;1371;0;1;946;9a80e04e1a17f194
>
>
>

-----------------------------------------------------------------
Securing Your Online Data Transfer with SSL.
A guide to understanding SSL certificates, how they operate and their 
application. By making use of an SSL certificate on your web server, you can 
securely collect sensitive information online, and increase business by giving 
your customers confidence that their transactions are safe.
http://www.dinclinx.com/Redirect.aspx?36;5001;25;1371;0;1;946;9a80e04e1a17f194


Reply via email to