Difference between revisions of "CTF-practice-evening:2014-04-14"

From Technologia Incognita
Jump to: navigation, search
Line 14: Line 14:
 
* See the page for the [[Ctf-evenings]]
 
* See the page for the [[Ctf-evenings]]
 
* Link to the Tech Inc [[TechInc-CTF-Scoreboard | Challenge Website Scoreboard]]
 
* Link to the Tech Inc [[TechInc-CTF-Scoreboard | Challenge Website Scoreboard]]
* Vulnserver (practice server)
 
* The guys is using Spike to fuzz each of the commands on port 9999
 
  
 
= PlaidCTF =
 
= PlaidCTF =
Line 26: Line 24:
 
* Coolfire has prepared a training on fuzzing w/ Spike today!
 
* Coolfire has prepared a training on fuzzing w/ Spike today!
 
* We are watching the video: [https://www.youtube.com/watch?v=DHvHGwczsMY From Fuzzing to Metasploit]
 
* We are watching the video: [https://www.youtube.com/watch?v=DHvHGwczsMY From Fuzzing to Metasploit]
 +
* Vulnserver (practice server)
 +
* The guys is using Spike (built into Kali Linux) to fuzz each of the commands on port 9999

Revision as of 19:17, 14 April 2014

CTF-practice-evening:2014-04-14
Date 2014/04/14
Time
Location ACTA
Type Hackathon
Contact Melanie

Capture The Flag evening - Part 14

  • 14 April, 2014 - 7 PM
  • Please bring along a laptop with you!!!

General CTF Info

PlaidCTF

  • Besides the WiCS players, only 3 people from Knuffelhackers showed up. That's kindof disappointing..  :-(
  • There's also only 4 people at the training evening tonight. Maybe it's worth sending out an email to the CTF list to ask why people aren't coming…

Fuzzing w/ Spike

  • Coolfire has prepared a training on fuzzing w/ Spike today!
  • We are watching the video: From Fuzzing to Metasploit
  • Vulnserver (practice server)
  • The guys is using Spike (built into Kali Linux) to fuzz each of the commands on port 9999