Difference between revisions of "Ctf-evenings"

From Technologia Incognita
Jump to: navigation, search
m
 
(78 intermediate revisions by 4 users not shown)
Line 1: Line 1:
 
{{Project
 
{{Project
 
|ProjectSkills=Hacking, forensics, problem solving
 
|ProjectSkills=Hacking, forensics, problem solving
|ProjectStatus=Active
+
|ProjectStatus=Dormant
 
|ProjectNiche=Software
 
|ProjectNiche=Software
 
|ProjectPurpose=Fun
 
|ProjectPurpose=Fun
Line 9: Line 9:
 
The format of this series is likely to evolve over time, but I currently assume that these evenings will feature a combination of web-based challenges, online competitions, and general-purpose learning/workshop evenings covering a variety of computer security (i.e. hacking, defensive) topics.    Everyone of all skill levels is welcome!!!!
 
The format of this series is likely to evolve over time, but I currently assume that these evenings will feature a combination of web-based challenges, online competitions, and general-purpose learning/workshop evenings covering a variety of computer security (i.e. hacking, defensive) topics.    Everyone of all skill levels is welcome!!!!
  
= Past Activities =
+
Our current schedule is a meeting at techinc every first monday of the month, we also try to do a ctf event every 1/2 months.
  
== Training evenings ==
+
= Training Evenings =
  
 +
== Upcoming ==
 +
 +
* July 14 - Dimitris (Volatility)
 +
* August 4 - Brainsmoke (Binary exploitation walkthrough)
 +
* August 11 - Melanie (wargame or video - TBD)
 +
* August 25 - Hitcon Retrospective
 +
 +
* By default, Melanie will fill in the weeks that aren't taken by anybody else
 +
 +
== Past ==
 +
 +
* [https://wiki.techinc.nl/index.php/CTF-practice-evening:2014-07-07 7 July, 2014] - Pwnium CTF Retrospective (via Dimitris)
 +
* [https://wiki.techinc.nl/index.php/CTF-practice-evening:2014-06-30 30 June, 2014] - Intro to Cuckoo Sandbox
 +
* [https://wiki.techinc.nl/index.php/CTF-practice-evening:2014-06-23 23 June, 2014] - PHP Filter Attacks  (via Coolfire)
 +
* [https://wiki.techinc.nl/index.php/CTF-practice-evening:2014-06-09 9 June, 2014] - Hack in the Box Retrospective (+Leviathan continued)
 +
* [https://wiki.techinc.nl/index.php/CTF-practice-evening:2014-05-12 12 May, 2014] - Leviathan wargame (OverTheWire)
 +
* [https://wiki.techinc.nl/index.php/CTF-practice-evening:2014-04-28 28 April, 2014] - Intro to x86 Assembly, Part 2
 +
* [https://wiki.techinc.nl/index.php/CTF-practice-evening:2014-04-14 14 April, 2014] - Intro to Metasploit
 +
* [https://wiki.techinc.nl/index.php/CTF:x86-assembly-video-day 6 April, 2014] - CTF-related video marathon
 +
* [https://wiki.techinc.nl/index.php/CTF-practice-evening:2014-03-31 31 March, 2014] - Cryptanalysis + OTW Krypton war-game
 +
* [https://wiki.techinc.nl/index.php/CTF-practice-evening:2014-03-24 24 March, 2014] - Binary exploitation + Codegate Minibomb walkthrough
 +
* [https://wiki.techinc.nl/index.php/CTF-practice-evening:2014-03-03 3 March, 2014] - Hack in the Box (HitB) Teaser CTF
 +
* [https://wiki.techinc.nl/index.php/CTF-practice-evening:2014-02-24 24 February, 2014] - Intro to x86 disassembly
 +
* [https://wiki.techinc.nl/index.php/CTF-practice-evening:2014-02-10 10 February, 2014] - IDB challenge @ Certified Secure
 +
* [http://wiki.techinc.nl/index.php/CTF-practice-evening:2014-02-03 3 February, 2014] - Burp Suite and SQLmap
 +
* [http://wiki.techinc.nl/index.php/CTF-practice-evening:2014-01-27 27 January, 2014 ] - PhDays retrospective + walkthroughs
 
* [http://wiki.techinc.nl/index.php/CTF-practice-evening:2014-01-13 13 January, 2014] - Intro to web hacking + Certified Secure
 
* [http://wiki.techinc.nl/index.php/CTF-practice-evening:2014-01-13 13 January, 2014] - Intro to web hacking + Certified Secure
 
* [http://wiki.techinc.nl/index.php/CTF-practice-evening:2014-01-06 6 January, 2014] - Wireshark Jumpstart 101 + GitS teaser (Armorall - VNC pcap)
 
* [http://wiki.techinc.nl/index.php/CTF-practice-evening:2014-01-06 6 January, 2014] - Wireshark Jumpstart 101 + GitS teaser (Armorall - VNC pcap)
* [http://wiki.techinc.nl/index.php/CTF-practice-evening:2013-12-23 23 December, 2013] - Intro to x86 disassembly + I/O Smash the Stack war-game
+
* [http://wiki.techinc.nl/index.php/CTF-practice-evening:2013-12-23 23 December, 2013] - Levels 1/2 @ I/O Smash the Stack
* [http://wiki.techinc.nl/index.php/CTF-practice-evening:2013-12-09 9 December, 2013] - UNIX + Bandit wargame
+
* [http://wiki.techinc.nl/index.php/CTF-practice-evening:2013-12-09 9 December, 2013] - UNIX + OTW Bandit wargame
 +
 
 +
= Competitions =
 +
 
 +
* We compete occasionally as [http://knuffelhackers.nl Team Knuffelhackers]!
 +
* And we occasionally partner w/ team [https://vubar.nl VUBAR]
 +
 
 +
== Upcoming ==
  
== Competitions ==
+
* [http://hitcon.org/2014/CTF/ HITCon] - Aug 16-18 (Team Knuffelhackers)
  
* [http://wiki.techinc.nl/index.php/CTF:PhDays-Quals-2014 Positive Hack Days Qualifiers 2014] - 25-27 January, 2014
+
== Past ==
  
 +
* [http://41.231.53.44:8282 Pwnium] - July 4-5 (Team Knuffelhackers)
 +
* [http://haxpo.nl/event-registration/?regevent_action=register&event_id=35 Hack in the Box] - May 28-30 (Various teams)
 +
* [https://wiki.techinc.nl/index.php/CTF:Plaid-CTF-2014 Plaid CTF] - 11-13 April, 2014 (Team Knuffelhackers)
 +
* [http://ctf.haxpo.nl/scores/ Hack in the Box (HitB) Teaser] - 3-4 March, 2014 (Team Knuffelhackers) - '''4th place'''
 +
* [http://ctf.codegate.org/ Codegate Preliminaries] - 22-23 February, 2014  (Team Knuffelhackers)
 +
* [https://olympic-ctf.ru/ Olympic CTF Sochi] - 7-9 February, 2014    (w/ Team VUBAR)
 +
* [http://wiki.techinc.nl/index.php/CTF:PhDays-Quals-2014 Positive Hack Days Qualifiers 2014] - 25-27 January, 2014  (Team Knuffelhackers)
 +
* [http://ructf.org/e/ RuCTFe 2013] - 14 December, 2013  (w/ Team VUBAR)
 +
* [http://ictf.cs.ucsb.edu/ UCSB iCTF 2013] - 6-7 December, 2013  (w/ Team VUBAR)
 +
 +
=== Write-ups ===
 +
[[CTF:Writeup-Olympic-CTF-Sochi-2014]]
  
 
= About the CTF Training Evenings =
 
= About the CTF Training Evenings =
Line 37: Line 82:
  
 
* 3 - '''Actual CTF events'''
 
* 3 - '''Actual CTF events'''
** There's a bunch of them on [http://ctftime.org/ CTF Time] - we should participate!
+
** There's a bunch of them on [http://ctftime.org/ CTF Time] - we participate occasionally!
** We can probably also join [http://ctftime.org/team/1353 VUBAR] when they are playing here!  (Brainsmoke said that this would probably be okay)
 
** We can also participate in own events, at other times..
 
* Possible team name: Knuffelhackers
 
  
 
== Other things that we can do ==
 
== Other things that we can do ==
Line 76: Line 118:
 
* http://www.hackthissite.org
 
* http://www.hackthissite.org
 
* https://microcorruption.com/ - Embedded hacking
 
* https://microcorruption.com/ - Embedded hacking
 +
* http://www.bright-shadows.net
 +
* http://www.matasano.com/articles/crypto-challenges/ - crypto challenges
  
 
= Reversing and Exploitation =
 
= Reversing and Exploitation =
  
 +
* http://coolfire.insomnia247.nl/BMA/X86_Win32_Reverse_Engineering_Cheat_Sheet.pdf - x86 reverse engineering cheat sheet
 
* [[GDB-Tips|GDB Tips]] - Some beginning tips for how to use GDB
 
* [[GDB-Tips|GDB Tips]] - Some beginning tips for how to use GDB
 
* https://www.securecoding.cert.org/confluence/display/seccode/CERT+C+Coding+Standard - Helpful for finding C constructs that can be exploited
 
* https://www.securecoding.cert.org/confluence/display/seccode/CERT+C+Coding+Standard - Helpful for finding C constructs that can be exploited
Line 89: Line 134:
 
* http://www.woodmann.com/crackz/Orc.htm
 
* http://www.woodmann.com/crackz/Orc.htm
 
* [https://github.com/longld/peda Python Exploit Development Assistance]
 
* [https://github.com/longld/peda Python Exploit Development Assistance]
 +
* [http://www.onlinedisassembler.com/odaweb/ Online Dissassembler]
 +
* [http://ropshell.com Ropshell.com]
  
 
Tools: objdump, readelf, gdb, ktrace/kdump
 
Tools: objdump, readelf, gdb, ktrace/kdump
 +
 +
= Windows binaries =
 +
 +
* http://innounp.sourceforge.net - Inno Setup Unpacker
 +
* OllyDbg
 +
* Ida Free
  
 
= UNIX hacking =
 
= UNIX hacking =
  
* http://askubuntu.com/questions/24006/how-do-i-reset-a-lost-administrative-password
+
* [http://askubuntu.com/questions/24006/how-do-i-reset-a-lost-administrative-password Log into Linux without a PW]
  
 
= Web hacking =
 
= Web hacking =
Line 100: Line 153:
 
* https://www.owasp.org/index.php/Category:Attack
 
* https://www.owasp.org/index.php/Category:Attack
 
* https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents
 
* https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents
 +
* https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet
 
* http://w3schools.com
 
* http://w3schools.com
 
* http://yehg.net/lab/#toolbox
 
* http://yehg.net/lab/#toolbox
Line 117: Line 171:
 
* http://www.jjtc.com/Steganography/tools.html
 
* http://www.jjtc.com/Steganography/tools.html
 
* http://www.slideshare.net/null0x00/nullcon-2010-steganography-stegananalysis-a-technical-psychological-perspective
 
* http://www.slideshare.net/null0x00/nullcon-2010-steganography-stegananalysis-a-technical-psychological-perspective
 +
* http://sox.sourceforge.net - Sound eXchange  (audio "swiss army knife")
 +
* http://spek.cc - Spek spectrum analyzer
 +
* Audacity
 +
* SDRsharp
  
 
= Forensics =
 
= Forensics =
  
 
* [http://www.garykessler.net/library/file_sigs.html File Signatures Table], [http://www.filesignatures.net File Signatures.net], [http://asecuritysite.com/forensics/magic DF Magic Numbers] - File format signatures
 
* [http://www.garykessler.net/library/file_sigs.html File Signatures Table], [http://www.filesignatures.net File Signatures.net], [http://asecuritysite.com/forensics/magic DF Magic Numbers] - File format signatures
 +
 +
= Crypto =
 +
 +
== Cryptanalysis ==
 +
 +
* http://www.simonsingh.net/The_Black_Chamber/chamberguide.html
 +
* http://www.cryptool-online.org/index.php?option=com_content&view=article&id=55&Itemid=53&lang=en
 +
* http://luizfirmino.blogspot.nl/2011/10/cryptanalysis-tools.html
 +
* http://www.matasano.com/articles/crypto-challenges/
 +
 +
== Cracking ==
 +
 +
* http://hashcat.net/oclhashcat/ - Hashcat
  
 
= Setting up a CTF =
 
= Setting up a CTF =

Latest revision as of 02:22, 1 October 2015

Projects
Participants MRieback
Skills Hacking, forensics, problem solving
Status Dormant
Niche Software
Purpose Fun

Welcome to the Tech Inc Capture the Flag (CTF) training event series!

The format of this series is likely to evolve over time, but I currently assume that these evenings will feature a combination of web-based challenges, online competitions, and general-purpose learning/workshop evenings covering a variety of computer security (i.e. hacking, defensive) topics. Everyone of all skill levels is welcome!!!!

Our current schedule is a meeting at techinc every first monday of the month, we also try to do a ctf event every 1/2 months.

Training Evenings

Upcoming

  • July 14 - Dimitris (Volatility)
  • August 4 - Brainsmoke (Binary exploitation walkthrough)
  • August 11 - Melanie (wargame or video - TBD)
  • August 25 - Hitcon Retrospective
  • By default, Melanie will fill in the weeks that aren't taken by anybody else

Past

Competitions

Upcoming

  • HITCon - Aug 16-18 (Team Knuffelhackers)

Past

Write-ups

CTF:Writeup-Olympic-CTF-Sochi-2014

About the CTF Training Evenings

Types of evenings

I envision the following 3 kinds of CTF training evenings:

  • 2 - Challenge website evenings
    • I setup a Scoreboard, so we can keep track of who's done which challenges
  • 3 - Actual CTF events
    • There's a bunch of them on CTF Time - we participate occasionally!

Other things that we can do

  • Setup a vulnerable server (Damn Vulnerable Linux, Metasploitable, etc..) and attack it
  • Preparing for competitions
    • Setup Etherpad (or another online "multiplayer notepad") so people can make notes and work together for each challenge
    • Preparing tools (Backtrack VM, other VM images with different tools)
    • Being able to emulate weird architectures for binaries
    • Being able to test shellcode on our own system
    • Maybe we can do something with hardware in the space (i have no idea what the status is of VMWare cluster in space, but i think we have one..)
  • Brainsmoke could talk about binary exploitation
    • We can also look at gdb / objdump / IDA / Hex-Rays

Challenge websites

Link to the Tech Inc Challenge Website Scoreboard: TechInc-CTF-Scoreboard

Reversing and Exploitation

Tools: objdump, readelf, gdb, ktrace/kdump

Windows binaries

UNIX hacking

Web hacking

Network challenges

Steganography

Forensics

Crypto

Cryptanalysis

Cracking

Setting up a CTF

Other stuff