Difference between revisions of "Ctf-evenings"
m |
|||
(78 intermediate revisions by 4 users not shown) | |||
Line 1: | Line 1: | ||
{{Project | {{Project | ||
|ProjectSkills=Hacking, forensics, problem solving | |ProjectSkills=Hacking, forensics, problem solving | ||
− | |ProjectStatus= | + | |ProjectStatus=Dormant |
|ProjectNiche=Software | |ProjectNiche=Software | ||
|ProjectPurpose=Fun | |ProjectPurpose=Fun | ||
Line 9: | Line 9: | ||
The format of this series is likely to evolve over time, but I currently assume that these evenings will feature a combination of web-based challenges, online competitions, and general-purpose learning/workshop evenings covering a variety of computer security (i.e. hacking, defensive) topics. Everyone of all skill levels is welcome!!!! | The format of this series is likely to evolve over time, but I currently assume that these evenings will feature a combination of web-based challenges, online competitions, and general-purpose learning/workshop evenings covering a variety of computer security (i.e. hacking, defensive) topics. Everyone of all skill levels is welcome!!!! | ||
− | + | Our current schedule is a meeting at techinc every first monday of the month, we also try to do a ctf event every 1/2 months. | |
− | + | = Training Evenings = | |
+ | == Upcoming == | ||
+ | |||
+ | * July 14 - Dimitris (Volatility) | ||
+ | * August 4 - Brainsmoke (Binary exploitation walkthrough) | ||
+ | * August 11 - Melanie (wargame or video - TBD) | ||
+ | * August 25 - Hitcon Retrospective | ||
+ | |||
+ | * By default, Melanie will fill in the weeks that aren't taken by anybody else | ||
+ | |||
+ | == Past == | ||
+ | |||
+ | * [https://wiki.techinc.nl/index.php/CTF-practice-evening:2014-07-07 7 July, 2014] - Pwnium CTF Retrospective (via Dimitris) | ||
+ | * [https://wiki.techinc.nl/index.php/CTF-practice-evening:2014-06-30 30 June, 2014] - Intro to Cuckoo Sandbox | ||
+ | * [https://wiki.techinc.nl/index.php/CTF-practice-evening:2014-06-23 23 June, 2014] - PHP Filter Attacks (via Coolfire) | ||
+ | * [https://wiki.techinc.nl/index.php/CTF-practice-evening:2014-06-09 9 June, 2014] - Hack in the Box Retrospective (+Leviathan continued) | ||
+ | * [https://wiki.techinc.nl/index.php/CTF-practice-evening:2014-05-12 12 May, 2014] - Leviathan wargame (OverTheWire) | ||
+ | * [https://wiki.techinc.nl/index.php/CTF-practice-evening:2014-04-28 28 April, 2014] - Intro to x86 Assembly, Part 2 | ||
+ | * [https://wiki.techinc.nl/index.php/CTF-practice-evening:2014-04-14 14 April, 2014] - Intro to Metasploit | ||
+ | * [https://wiki.techinc.nl/index.php/CTF:x86-assembly-video-day 6 April, 2014] - CTF-related video marathon | ||
+ | * [https://wiki.techinc.nl/index.php/CTF-practice-evening:2014-03-31 31 March, 2014] - Cryptanalysis + OTW Krypton war-game | ||
+ | * [https://wiki.techinc.nl/index.php/CTF-practice-evening:2014-03-24 24 March, 2014] - Binary exploitation + Codegate Minibomb walkthrough | ||
+ | * [https://wiki.techinc.nl/index.php/CTF-practice-evening:2014-03-03 3 March, 2014] - Hack in the Box (HitB) Teaser CTF | ||
+ | * [https://wiki.techinc.nl/index.php/CTF-practice-evening:2014-02-24 24 February, 2014] - Intro to x86 disassembly | ||
+ | * [https://wiki.techinc.nl/index.php/CTF-practice-evening:2014-02-10 10 February, 2014] - IDB challenge @ Certified Secure | ||
+ | * [http://wiki.techinc.nl/index.php/CTF-practice-evening:2014-02-03 3 February, 2014] - Burp Suite and SQLmap | ||
+ | * [http://wiki.techinc.nl/index.php/CTF-practice-evening:2014-01-27 27 January, 2014 ] - PhDays retrospective + walkthroughs | ||
* [http://wiki.techinc.nl/index.php/CTF-practice-evening:2014-01-13 13 January, 2014] - Intro to web hacking + Certified Secure | * [http://wiki.techinc.nl/index.php/CTF-practice-evening:2014-01-13 13 January, 2014] - Intro to web hacking + Certified Secure | ||
* [http://wiki.techinc.nl/index.php/CTF-practice-evening:2014-01-06 6 January, 2014] - Wireshark Jumpstart 101 + GitS teaser (Armorall - VNC pcap) | * [http://wiki.techinc.nl/index.php/CTF-practice-evening:2014-01-06 6 January, 2014] - Wireshark Jumpstart 101 + GitS teaser (Armorall - VNC pcap) | ||
− | * [http://wiki.techinc.nl/index.php/CTF-practice-evening:2013-12-23 23 December, 2013] - | + | * [http://wiki.techinc.nl/index.php/CTF-practice-evening:2013-12-23 23 December, 2013] - Levels 1/2 @ I/O Smash the Stack |
− | * [http://wiki.techinc.nl/index.php/CTF-practice-evening:2013-12-09 9 December, 2013] - UNIX + Bandit wargame | + | * [http://wiki.techinc.nl/index.php/CTF-practice-evening:2013-12-09 9 December, 2013] - UNIX + OTW Bandit wargame |
+ | |||
+ | = Competitions = | ||
+ | |||
+ | * We compete occasionally as [http://knuffelhackers.nl Team Knuffelhackers]! | ||
+ | * And we occasionally partner w/ team [https://vubar.nl VUBAR] | ||
+ | |||
+ | == Upcoming == | ||
− | + | * [http://hitcon.org/2014/CTF/ HITCon] - Aug 16-18 (Team Knuffelhackers) | |
− | + | == Past == | |
+ | * [http://41.231.53.44:8282 Pwnium] - July 4-5 (Team Knuffelhackers) | ||
+ | * [http://haxpo.nl/event-registration/?regevent_action=register&event_id=35 Hack in the Box] - May 28-30 (Various teams) | ||
+ | * [https://wiki.techinc.nl/index.php/CTF:Plaid-CTF-2014 Plaid CTF] - 11-13 April, 2014 (Team Knuffelhackers) | ||
+ | * [http://ctf.haxpo.nl/scores/ Hack in the Box (HitB) Teaser] - 3-4 March, 2014 (Team Knuffelhackers) - '''4th place''' | ||
+ | * [http://ctf.codegate.org/ Codegate Preliminaries] - 22-23 February, 2014 (Team Knuffelhackers) | ||
+ | * [https://olympic-ctf.ru/ Olympic CTF Sochi] - 7-9 February, 2014 (w/ Team VUBAR) | ||
+ | * [http://wiki.techinc.nl/index.php/CTF:PhDays-Quals-2014 Positive Hack Days Qualifiers 2014] - 25-27 January, 2014 (Team Knuffelhackers) | ||
+ | * [http://ructf.org/e/ RuCTFe 2013] - 14 December, 2013 (w/ Team VUBAR) | ||
+ | * [http://ictf.cs.ucsb.edu/ UCSB iCTF 2013] - 6-7 December, 2013 (w/ Team VUBAR) | ||
+ | |||
+ | === Write-ups === | ||
+ | [[CTF:Writeup-Olympic-CTF-Sochi-2014]] | ||
= About the CTF Training Evenings = | = About the CTF Training Evenings = | ||
Line 37: | Line 82: | ||
* 3 - '''Actual CTF events''' | * 3 - '''Actual CTF events''' | ||
− | ** There's a bunch of them on [http://ctftime.org/ CTF Time] - we | + | ** There's a bunch of them on [http://ctftime.org/ CTF Time] - we participate occasionally! |
− | |||
− | |||
− | |||
== Other things that we can do == | == Other things that we can do == | ||
Line 76: | Line 118: | ||
* http://www.hackthissite.org | * http://www.hackthissite.org | ||
* https://microcorruption.com/ - Embedded hacking | * https://microcorruption.com/ - Embedded hacking | ||
+ | * http://www.bright-shadows.net | ||
+ | * http://www.matasano.com/articles/crypto-challenges/ - crypto challenges | ||
= Reversing and Exploitation = | = Reversing and Exploitation = | ||
+ | * http://coolfire.insomnia247.nl/BMA/X86_Win32_Reverse_Engineering_Cheat_Sheet.pdf - x86 reverse engineering cheat sheet | ||
* [[GDB-Tips|GDB Tips]] - Some beginning tips for how to use GDB | * [[GDB-Tips|GDB Tips]] - Some beginning tips for how to use GDB | ||
* https://www.securecoding.cert.org/confluence/display/seccode/CERT+C+Coding+Standard - Helpful for finding C constructs that can be exploited | * https://www.securecoding.cert.org/confluence/display/seccode/CERT+C+Coding+Standard - Helpful for finding C constructs that can be exploited | ||
Line 89: | Line 134: | ||
* http://www.woodmann.com/crackz/Orc.htm | * http://www.woodmann.com/crackz/Orc.htm | ||
* [https://github.com/longld/peda Python Exploit Development Assistance] | * [https://github.com/longld/peda Python Exploit Development Assistance] | ||
+ | * [http://www.onlinedisassembler.com/odaweb/ Online Dissassembler] | ||
+ | * [http://ropshell.com Ropshell.com] | ||
Tools: objdump, readelf, gdb, ktrace/kdump | Tools: objdump, readelf, gdb, ktrace/kdump | ||
+ | |||
+ | = Windows binaries = | ||
+ | |||
+ | * http://innounp.sourceforge.net - Inno Setup Unpacker | ||
+ | * OllyDbg | ||
+ | * Ida Free | ||
= UNIX hacking = | = UNIX hacking = | ||
− | * http://askubuntu.com/questions/24006/how-do-i-reset-a-lost-administrative-password | + | * [http://askubuntu.com/questions/24006/how-do-i-reset-a-lost-administrative-password Log into Linux without a PW] |
= Web hacking = | = Web hacking = | ||
Line 100: | Line 153: | ||
* https://www.owasp.org/index.php/Category:Attack | * https://www.owasp.org/index.php/Category:Attack | ||
* https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents | * https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents | ||
+ | * https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet | ||
* http://w3schools.com | * http://w3schools.com | ||
* http://yehg.net/lab/#toolbox | * http://yehg.net/lab/#toolbox | ||
Line 117: | Line 171: | ||
* http://www.jjtc.com/Steganography/tools.html | * http://www.jjtc.com/Steganography/tools.html | ||
* http://www.slideshare.net/null0x00/nullcon-2010-steganography-stegananalysis-a-technical-psychological-perspective | * http://www.slideshare.net/null0x00/nullcon-2010-steganography-stegananalysis-a-technical-psychological-perspective | ||
+ | * http://sox.sourceforge.net - Sound eXchange (audio "swiss army knife") | ||
+ | * http://spek.cc - Spek spectrum analyzer | ||
+ | * Audacity | ||
+ | * SDRsharp | ||
= Forensics = | = Forensics = | ||
* [http://www.garykessler.net/library/file_sigs.html File Signatures Table], [http://www.filesignatures.net File Signatures.net], [http://asecuritysite.com/forensics/magic DF Magic Numbers] - File format signatures | * [http://www.garykessler.net/library/file_sigs.html File Signatures Table], [http://www.filesignatures.net File Signatures.net], [http://asecuritysite.com/forensics/magic DF Magic Numbers] - File format signatures | ||
+ | |||
+ | = Crypto = | ||
+ | |||
+ | == Cryptanalysis == | ||
+ | |||
+ | * http://www.simonsingh.net/The_Black_Chamber/chamberguide.html | ||
+ | * http://www.cryptool-online.org/index.php?option=com_content&view=article&id=55&Itemid=53&lang=en | ||
+ | * http://luizfirmino.blogspot.nl/2011/10/cryptanalysis-tools.html | ||
+ | * http://www.matasano.com/articles/crypto-challenges/ | ||
+ | |||
+ | == Cracking == | ||
+ | |||
+ | * http://hashcat.net/oclhashcat/ - Hashcat | ||
= Setting up a CTF = | = Setting up a CTF = |
Latest revision as of 02:22, 1 October 2015
Projects | |
---|---|
Participants | MRieback |
Skills | Hacking, forensics, problem solving |
Status | Dormant |
Niche | Software |
Purpose | Fun |
Welcome to the Tech Inc Capture the Flag (CTF) training event series!
The format of this series is likely to evolve over time, but I currently assume that these evenings will feature a combination of web-based challenges, online competitions, and general-purpose learning/workshop evenings covering a variety of computer security (i.e. hacking, defensive) topics. Everyone of all skill levels is welcome!!!!
Our current schedule is a meeting at techinc every first monday of the month, we also try to do a ctf event every 1/2 months.
Contents
Training Evenings
Upcoming
- July 14 - Dimitris (Volatility)
- August 4 - Brainsmoke (Binary exploitation walkthrough)
- August 11 - Melanie (wargame or video - TBD)
- August 25 - Hitcon Retrospective
- By default, Melanie will fill in the weeks that aren't taken by anybody else
Past
- 7 July, 2014 - Pwnium CTF Retrospective (via Dimitris)
- 30 June, 2014 - Intro to Cuckoo Sandbox
- 23 June, 2014 - PHP Filter Attacks (via Coolfire)
- 9 June, 2014 - Hack in the Box Retrospective (+Leviathan continued)
- 12 May, 2014 - Leviathan wargame (OverTheWire)
- 28 April, 2014 - Intro to x86 Assembly, Part 2
- 14 April, 2014 - Intro to Metasploit
- 6 April, 2014 - CTF-related video marathon
- 31 March, 2014 - Cryptanalysis + OTW Krypton war-game
- 24 March, 2014 - Binary exploitation + Codegate Minibomb walkthrough
- 3 March, 2014 - Hack in the Box (HitB) Teaser CTF
- 24 February, 2014 - Intro to x86 disassembly
- 10 February, 2014 - IDB challenge @ Certified Secure
- 3 February, 2014 - Burp Suite and SQLmap
- 27 January, 2014 - PhDays retrospective + walkthroughs
- 13 January, 2014 - Intro to web hacking + Certified Secure
- 6 January, 2014 - Wireshark Jumpstart 101 + GitS teaser (Armorall - VNC pcap)
- 23 December, 2013 - Levels 1/2 @ I/O Smash the Stack
- 9 December, 2013 - UNIX + OTW Bandit wargame
Competitions
- We compete occasionally as Team Knuffelhackers!
- And we occasionally partner w/ team VUBAR
Upcoming
- HITCon - Aug 16-18 (Team Knuffelhackers)
Past
- Pwnium - July 4-5 (Team Knuffelhackers)
- Hack in the Box - May 28-30 (Various teams)
- Plaid CTF - 11-13 April, 2014 (Team Knuffelhackers)
- Hack in the Box (HitB) Teaser - 3-4 March, 2014 (Team Knuffelhackers) - 4th place
- Codegate Preliminaries - 22-23 February, 2014 (Team Knuffelhackers)
- Olympic CTF Sochi - 7-9 February, 2014 (w/ Team VUBAR)
- Positive Hack Days Qualifiers 2014 - 25-27 January, 2014 (Team Knuffelhackers)
- RuCTFe 2013 - 14 December, 2013 (w/ Team VUBAR)
- UCSB iCTF 2013 - 6-7 December, 2013 (w/ Team VUBAR)
Write-ups
CTF:Writeup-Olympic-CTF-Sochi-2014
About the CTF Training Evenings
Types of evenings
I envision the following 3 kinds of CTF training evenings:
- 1 - Workshop/learning evenings - network analysis/forensics (Wireshark), filesystem forensics, reversing(Ollydbg, etc..)/Pwnables, code deobfuscation, pen testing (Kali-Backtrack/Metasploit/buffer overflows), cryptanalysis, web security (XSS, SQL injection, etc..), stegonography, Commandline kung-fu, recon/trivia/etc..
- Example: I've got a whole slew of Wireshark training videos - we can watch them together!
- We could also occasionally screen Defcon/CCC/Other videos on fun topics!
- 2 - Challenge website evenings
- I setup a Scoreboard, so we can keep track of who's done which challenges
- 3 - Actual CTF events
- There's a bunch of them on CTF Time - we participate occasionally!
Other things that we can do
- Setup a vulnerable server (Damn Vulnerable Linux, Metasploitable, etc..) and attack it
- Other examples: http://exploit-exercises.com/
- Preparing for competitions
- Setup Etherpad (or another online "multiplayer notepad") so people can make notes and work together for each challenge
- We're currently using: Riseup Pad
- Preparing tools (Backtrack VM, other VM images with different tools)
- Being able to emulate weird architectures for binaries
- Being able to test shellcode on our own system
- Maybe we can do something with hardware in the space (i have no idea what the status is of VMWare cluster in space, but i think we have one..)
- Setup Etherpad (or another online "multiplayer notepad") so people can make notes and work together for each challenge
- Brainsmoke could talk about binary exploitation
- We can also look at gdb / objdump / IDA / Hex-Rays
Challenge websites
Link to the Tech Inc Challenge Website Scoreboard: TechInc-CTF-Scoreboard
- http://captf.com/practice-ctf/
- http://ctf.forgottensec.com/wiki/
- http://www.overthewire.org/wargames/ (Bandit is good for beginners)
- https://www.certifiedsecure.com
- http://io.smashthestack.org
- http://ismellpackets.com/
- http://www.kroosec.com/?m=1
- http://exploit-exercises.com/fusion
- http://exploit-exercises.com/protostar
- http://opensecuritytraining.info/Training.html
- http://www.securitytreasurehunt.com/
- http://forensicscontest.com/
- http://ebctf.nl/challenges
- http://sourceforge.net/projects/owaspshepherd/files/ - VM
- http://www.hackthissite.org
- https://microcorruption.com/ - Embedded hacking
- http://www.bright-shadows.net
- http://www.matasano.com/articles/crypto-challenges/ - crypto challenges
Reversing and Exploitation
- http://coolfire.insomnia247.nl/BMA/X86_Win32_Reverse_Engineering_Cheat_Sheet.pdf - x86 reverse engineering cheat sheet
- GDB Tips - Some beginning tips for how to use GDB
- https://www.securecoding.cert.org/confluence/display/seccode/CERT+C+Coding+Standard - Helpful for finding C constructs that can be exploited
- http://sourceware.org/gdb/current/onlinedocs/gdb/index.html - GDB manual
- http://sourceware.org/binutils/docs-2.24/binutils/index.html - GNU Binutils manual
- http://www.youtube.com/watch?v=gYOy7CGpPIU - The Making of Atlas: from Script Kiddie to Hacker in 5 Sleepless Nights (video)
- Hacking: The Art of Exploitation (book)
- Reversing: Secrets of Reverse Engineering (book)
- http://www.woodmann.com/fravia/howto1.htm
- http://www.woodmann.com/crackz/Orc.htm
- Python Exploit Development Assistance
- Online Dissassembler
- Ropshell.com
Tools: objdump, readelf, gdb, ktrace/kdump
Windows binaries
- http://innounp.sourceforge.net - Inno Setup Unpacker
- OllyDbg
- Ida Free
UNIX hacking
Web hacking
- https://www.owasp.org/index.php/Category:Attack
- https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents
- https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet
- http://w3schools.com
- http://yehg.net/lab/#toolbox
- https://hackvertor.co.uk/public
- Burp Suite
- fuzzdb
- Nikto
- http://www.irongeek.com/i.php?page=videos/web-pen-testing-workshop - Nice series of videos
Network challenges
- For VNC: rfbproxy / Rfbplayer
- chaosreader
Steganography
- http://www.jjtc.com/Steganography/tools.html
- http://www.slideshare.net/null0x00/nullcon-2010-steganography-stegananalysis-a-technical-psychological-perspective
- http://sox.sourceforge.net - Sound eXchange (audio "swiss army knife")
- http://spek.cc - Spek spectrum analyzer
- Audacity
- SDRsharp
Forensics
- File Signatures Table, File Signatures.net, DF Magic Numbers - File format signatures
Crypto
Cryptanalysis
- http://www.simonsingh.net/The_Black_Chamber/chamberguide.html
- http://www.cryptool-online.org/index.php?option=com_content&view=article&id=55&Itemid=53&lang=en
- http://luizfirmino.blogspot.nl/2011/10/cryptanalysis-tools.html
- http://www.matasano.com/articles/crypto-challenges/
Cracking
- http://hashcat.net/oclhashcat/ - Hashcat
Setting up a CTF
Other stuff
- http://ctftime.org/ - Event listings and write-ups
- http://hackflag.org/forum/
- http://sysexit.wordpress.com/category/writeups/
- http://www.hackers.nl/about/introduktie/
- http://www.enigmagroup.org/pages/basics/
- http://shell-storm.org/repo/CTF/ - Archive of previous CTFs
- http://mitrecyberacademy.org/stem/moodle/course/view.php?id=13
- http://opensecuritytraining.info/Training.html
- http://www.irongeek.com/i.php?page=security/hackingillustrated