Difference between revisions of "CTF-practice-evening:2014-04-14"

From Technologia Incognita
Jump to: navigation, search
Line 20: Line 20:
 
* There's also only 4 people at the training evening tonight.  Maybe it's worth sending out an email to the CTF list to ask why people aren't coming…
 
* There's also only 4 people at the training evening tonight.  Maybe it's worth sending out an email to the CTF list to ask why people aren't coming…
  
= Fuzzing w/ Spike =
+
= Metasploit + Fuzzing w/ Spike =
  
 
* Coolfire has prepared the training for this evening!  :-)
 
* Coolfire has prepared the training for this evening!  :-)

Revision as of 19:50, 14 April 2014

CTF-practice-evening:2014-04-14
Date 2014/04/14
Time
Location ACTA
Type Hackathon
Contact Melanie

Capture The Flag evening - Part 14

  • 14 April, 2014 - 7 PM
  • Please bring along a laptop with you!!!

General CTF Info

PlaidCTF

  • Besides the WiCS players, only 3 people from Knuffelhackers showed up. That's kindof disappointing..  :-(
  • There's also only 4 people at the training evening tonight. Maybe it's worth sending out an email to the CTF list to ask why people aren't coming…

Metasploit + Fuzzing w/ Spike

  • Coolfire has prepared the training for this evening!  :-)
  • We watched the video: From Fuzzing to Metasploit
  • They used Vulnserver (practice server)
  • The guys is using Spike (built into Kali Linux) to fuzz each of the commands on port 9999
  • He steps through how to use Metasploit to automate the full process

Metasploit Megaprimer Videos