CTF-practice-evening:2014-04-14: Difference between revisions

From Technologia Incognita
Jump to navigation Jump to search
MRieback (talk | contribs)
No edit summary
MRieback (talk | contribs)
No edit summary
Line 22: Line 22:
= Fuzzing w/ Spike =
= Fuzzing w/ Spike =


* Coolfire has prepared a training on fuzzing w/ Spike today!
* Coolfire has prepared the training for this evening!   :-)
* We are watching the video: [https://www.youtube.com/watch?v=DHvHGwczsMY From Fuzzing to Metasploit]
* We watched the video: [https://www.youtube.com/watch?v=DHvHGwczsMY From Fuzzing to Metasploit]
* Vulnserver (practice server)
* They used Vulnserver (practice server)
* The guys is using Spike (built into Kali Linux) to fuzz each of the commands on port 9999
* The guys is using Spike (built into Kali Linux) to fuzz each of the commands on port 9999
* He steps through how to use Metasploit to automate the full process


= Metasploit Megaprimer Videos =
= Metasploit Megaprimer Videos =


* [https://www.youtube.com/watch?v=W3X1YkYUUVc Part I]
* [https://www.youtube.com/watch?v=W3X1YkYUUVc Part I]

Revision as of 20:50, 14 April 2014


CTF-practice-evening:2014-04-14
Date 2014/04/14
Time
Location ACTA
Type Hackathon
Contact Melanie
iCalendar Add to calendar

Capture The Flag evening - Part 14

  • 14 April, 2014 - 7 PM
  • Please bring along a laptop with you!!!

General CTF Info

PlaidCTF

  • Besides the WiCS players, only 3 people from Knuffelhackers showed up. That's kindof disappointing..  :-(
  • There's also only 4 people at the training evening tonight. Maybe it's worth sending out an email to the CTF list to ask why people aren't coming…

Fuzzing w/ Spike

  • Coolfire has prepared the training for this evening!  :-)
  • We watched the video: From Fuzzing to Metasploit
  • They used Vulnserver (practice server)
  • The guys is using Spike (built into Kali Linux) to fuzz each of the commands on port 9999
  • He steps through how to use Metasploit to automate the full process

Metasploit Megaprimer Videos