DARPA's Cyber Grand Challenge: Expanded Highlights from the Final Event
HTML-код
- Опубликовано: 6 авг 2016
- On August 4, 2016, seven high-performance computers successfully played a game of Capture the Flag during the Final Event of DARPA's Cyber Grand Challenge. In doing so, they made history, proving that it is possible to automate cybersecurity. The winners: 1st Place - Mayhem, built by ForAllSecure; 2nd Place - Xandra, built by TECHx; 3rd Place - Mechanical Phish, built by Shellphish. From here, it is up to the teams and the hacker and programmer communities to continue this revolution in computer security.
For more information visit: www.cybergrandchallenge.com.
#DARPACGC Наука
Ok, what the hell did they do with all of those super computers.
Played fork knife
Running crysis
It's with the nsa noe
With medium settings
@@KINGCASH1337 ^
no clue wtf I just watched
bruh same 🤷🏻♂️
lol
We are in the future. This is awesome.
Please put back up the "Cyber Grand Challenge LIVE" 4.5 hours video back up please.
I want to watch the whole thing!
I was at the whole thing. It was AWESOME
Dre error see was zero see feeds da
I’m an idiot.
@Howie Tran bro tf you on about leave this man alone, knowing how to program a vcr should be something you congratulate someone on, not something you degrade and make fun of someone for. Shame on you
I love how one of the TechX guys has to be in his 60s or even older
They are very experienced, no wait.....highly experienced.. That's why they are there.
woah the team with the least members won. those brains man
Projects like this can easily become, a matter of too many heads in one toliet....
Awesome work
thank god! I don't have nothing to hide, the story is out tbh...
You do realize the point of this was developing new methods to rapidly patch vulnerabilities which previously were too difficult to find using traditional techniques? Finding a vuln using machine learning is old news, patching it and proving understand however is very much a new and exciting thing.
Hi guys, im sorry but i want to know tha name of that black man, that is dressing a blue shirt who introducing one of part on this video. i really appreciate tha accent
whta the hell is a POV? point of view?
proof of vulnerability.
proof of vulnerability
here's how you win:
pull the power switch on the whole fucking tournament center, run to the safe, crack it with resonance, take the cash, get away.
Pleasure seeing hakeem here
so, those refs are hackers too, right?
but can it run quake 2 with rtx on?
They could have explained this so much better than they did.
Is the guy at 8:30 a vampire, or has he not slept in 7 weeks?
Probably insomnia, a lot of hackers have this.
whats a POV?
Emil Aaltonen I'm guessing"point of vulnerability"
It's proof of vulnerability.
wait what? that i'm aware it's point of view.
Not in this context :-D
Yeah I also missed that part...
Can someone make money on a hacking esport team? Are there even professional esport hacking teams? do you think that hacking as an esport will ever have the significance or salary of a professional esport (gamer)? I'm new to all this and am very curious if this could become a profession in the future.
So this is hacking...ok
6:24 I was shocked when I heard his voice. I was sure he was a girl
hahahahahahaha
eillot be like what the fuck is this give me for 10im
baja
this shit is so easy
Can you teach me
What the fuck am I watching?
sandmail challenge.. all lose.. DARPA&Window must be sad if you ask them directly..they shall give critics and not award
501c3 inspectorz
"The air-gap also validates that there's no other outside influence" Air gaps don't stop wireless communication... EPIC FAIL.
Air-gapping by definition applies to wireless communication as well, as wireless is a form of networking.
Nice try being pedantic, feel free to give it another go after doing a cursory search of the definition.
The only thing I know about POV is that it is a porn category......
Des tocard ou pas very simple solution. A problème for amateurs information radioactivité use dna 🇬🇧🇮🇱🇷🇺🇮🇷🇩🇪🇫🇷🇨🇦🇱🇧🇯🇵🇨🇳🇩🇿🇪🇺etc eux first 🇫🇷busness game 🔌 since 1983
I sincerely hope your risk mitigation efforts include measure addressing digital malicious adversaries, limiting their benefits from these activities. E.g. Cyber Copycat Pirates, Delusional Pathetic Repugnant Kountifeiter, etc.