Difference between revisions of "CTF-practice-evening:2014-04-14"
Line 22: | Line 22: | ||
= Fuzzing w/ Spike = | = Fuzzing w/ Spike = | ||
− | * Coolfire has prepared | + | * Coolfire has prepared the training for this evening! :-) |
− | * We | + | * We watched the video: [https://www.youtube.com/watch?v=DHvHGwczsMY From Fuzzing to Metasploit] |
− | * Vulnserver (practice server) | + | * They used Vulnserver (practice server) |
* The guys is using Spike (built into Kali Linux) to fuzz each of the commands on port 9999 | * The guys is using Spike (built into Kali Linux) to fuzz each of the commands on port 9999 | ||
+ | * He steps through how to use Metasploit to automate the full process | ||
= Metasploit Megaprimer Videos = | = Metasploit Megaprimer Videos = | ||
* [https://www.youtube.com/watch?v=W3X1YkYUUVc Part I] | * [https://www.youtube.com/watch?v=W3X1YkYUUVc Part I] |
Revision as of 19:50, 14 April 2014
CTF-practice-evening:2014-04-14 | |
---|---|
Date | 2014/04/14 |
Time | |
Location | ACTA |
Type | Hackathon |
Contact | Melanie |
Contents
Capture The Flag evening - Part 14
- 14 April, 2014 - 7 PM
- Please bring along a laptop with you!!!
General CTF Info
- See the page for the Ctf-evenings
- Link to the Tech Inc Challenge Website Scoreboard
PlaidCTF
- Besides the WiCS players, only 3 people from Knuffelhackers showed up. That's kindof disappointing.. :-(
- There's also only 4 people at the training evening tonight. Maybe it's worth sending out an email to the CTF list to ask why people aren't coming…
Fuzzing w/ Spike
- Coolfire has prepared the training for this evening! :-)
- We watched the video: From Fuzzing to Metasploit
- They used Vulnserver (practice server)
- The guys is using Spike (built into Kali Linux) to fuzz each of the commands on port 9999
- He steps through how to use Metasploit to automate the full process