Difference between revisions of "CTF-practice-evening:2013-12-09"

From Technologia Incognita
Jump to: navigation, search
Line 5: Line 5:
 
|Contact=Melanie
 
|Contact=Melanie
 
}}
 
}}
 
 
= 9 December, 2013 - 8 PM =
 
= 9 December, 2013 - 8 PM =
  
Line 27: Line 26:
  
 
* 2 - Challenge website evenings
 
* 2 - Challenge website evenings
** Scoreboard
+
** I will setup a scoreboard
  
 
* 3 - Actual CTF events
 
* 3 - Actual CTF events
 +
** There's a bunch of them on CTF Time - we should participate!
 +
** We can probably also join VUBAR when they are playing here!  (Etienne said that this would probably be okay)
  
 
* We probably won't start out being very good -- BUT after the CTF events, we should analyse them, so we can improve.
 
* We probably won't start out being very good -- BUT after the CTF events, we should analyse them, so we can improve.
 
* We could setup a vulnerable server (Damn Vulnerable Linux, etc..) and play with attacking it
 
* We could setup a vulnerable server (Damn Vulnerable Linux, etc..) and play with attacking it

Revision as of 20:34, 9 December 2013

CTF-practice-evening:2013-12-09
Date 2013/12/09
Time
Location Tech Inc
Type Workshop
Contact Melanie

9 December, 2013 - 8 PM

Capture The Flag evening - Part I

We'll start at 8 PM. Please bring along a laptop with you!!!

General CTF Info

See the page for the Ctf-evenings

Notes

  • 7 people present: some programmers, some sysadmins, some security folks

Types of evenings

I envision the following kinds of CTF

  • 1 - Informatie evenings (Wireshark, Ollydbg, Nessus/Metasploit)
    • Wireshark training video
  • 2 - Challenge website evenings
    • I will setup a scoreboard
  • 3 - Actual CTF events
    • There's a bunch of them on CTF Time - we should participate!
    • We can probably also join VUBAR when they are playing here! (Etienne said that this would probably be okay)
  • We probably won't start out being very good -- BUT after the CTF events, we should analyse them, so we can improve.
  • We could setup a vulnerable server (Damn Vulnerable Linux, etc..) and play with attacking it