Advice on creating KOTH event

Does anyone have any advice/resources for setting up a local KOTH-type event where multiple teams would compete for control of a vulnerable machine? I’m in a local highschool cybersecurity club and we would love to host an event like this for our members and possibly some other local schools. I’ve been looking around at things like NetKotH but can’t find any recent projects. I’m open to building my own challenge framework, but would much rather use something that has already been made. Any and all advice would be appreciated!

submitted by /u/lolidontcareanymore1
[link] [comments]

Best value VPS provider to host Kali for CTF’s?

Genuinely thinking of buying a VPS solely to VNC into it for CTF’s only.

Something like htb pro labs ‘cybernetics’, so I can leave my session intact.

The problem is the price of these. Preferably something in the oceanic region.

Anyone have any tips for good VPS providers? Would likely either SSH tunnel RDP or VNC into it.

submitted by /u/thehunter699
[link] [comments]

Apple backported patches for CVE-2022-42856 zero-day on older iPhones, iPads

Apple has backported the security updates for the zero-day vulnerability CVE-2022-42856 to older iPhones and iPads. On December 2022, Apple released security updates to address a new zero-day vulnerability, tracked as CVE-2022-42856, that is actively exploited in attacks against iPhones. The IT giant released security bulletins for iOS/iPadOS 15.7.2, Safari 16.2, tvOS 16.2, and macOS Ventura 13.1. Apple addressed […]

The post Apple backported patches for CVE-2022-42856 zero-day on older iPhones, iPads appeared first on Security Affairs.

Just found OccupyTheWeb and his site

Has anyone subscribed to his gold subscription and is it worth it or should I just buy some of his books and read those? submitted by /u/quave210 [link] [comments]

Proxy resources

I’m currently testing a client site right now and I just messed up by going in too gung-ho with the scans without checking for a WAF. I need to route my scans through something else other than Tor, as exit nodes are blocked. The client is pretty generous, so I’ve got a good 3 weeks to find a workaround.

I’d like to know if anyone has any good proxylists. I’ve done a good bit of research and sites like https://hidemy.name/en/proxy-list/ seem like BS. I can’t seem to get traffic through them via proxychains.

Any help?

EDIT: It’s not hard to check proxychains.conf syntax, and I scanned the same ports they say are open.

It’s like… they’re open, but there’s clearly no service running on them or they aren’t actually configured to pass traffic through.

I could always go to a coffee shop or whatever down the road. But I’d like to be able to do this from my own home. Client won’t take me off the deny list either. Just “part of the test”

submitted by /u/EnthusiasmWorried496
[link] [comments]

Ransomware attack destroyed all my files, what I should be concerned about?!

I was working on a project and needed to download some codes from github. Apparently one of those downloads included a Ransomware. So my laptop was locked with blue screen, eventually I was able to login but couldn’t open any word/pdf docs. There was a txt file that ask me to send bitcoin or they will post my data everywhere! Honestly I don’t care cause I don’t have a lot of important data! But I am just curious to know if they can really access my files, or if it’s just a software that run and spread the virus locally!! Is there anything I have to worry about? Should I be concerned? Thank you!

submitted by /u/Modric008
[link] [comments]

Two flaws in Samsung Galaxy Store can allow to install Apps and execute JS code

Researchers found two flaws in Samsung Galaxy Store that could be exploited to install applications or achieve code execution on the devices. Researchers from cybersecurity firm NCC Group published technical details on two vulnerabilities, tracked as CVE-2023-21433 and CVE-2023-21434, in Samsung Galaxy Store that could be exploited to install applications or execute malicious JavaScript code. […]

The post Two flaws in Samsung Galaxy Store can allow to install Apps and execute JS code appeared first on Security Affairs.

What Laws would you be breaking here?

Just a draw on a theoretical take here – let’s say that you hack someones old facebokk that they don’t even use, to put to good for yourself… then what laws would you be breaking and in laymans terms what laws would you be breaking? submitted by…