Difference between revisions of "CTF-practice-evening:2013-12-09"
Line 14: | Line 14: | ||
See the page for the [[Ctf-evenings]] | See the page for the [[Ctf-evenings]] | ||
+ | Link to the Tech Inc Challenge Website Scoreboard: [[TechInc-CTF-Scoreboard]] | ||
= Notes = | = Notes = | ||
Line 27: | Line 28: | ||
* 2 - '''Challenge website evenings''' | * 2 - '''Challenge website evenings''' | ||
− | ** I | + | ** I setup a scoreboard, so we can keep track of who's done which challenges |
* 3 - '''Actual CTF events''' | * 3 - '''Actual CTF events''' |
Revision as of 21:10, 9 December 2013
CTF-practice-evening:2013-12-09 | |
---|---|
Date | 2013/12/09 |
Time | |
Location | Tech Inc |
Type | Workshop |
Contact | Melanie |
Contents
9 December, 2013 - 8 PM
Capture The Flag evening - Part I
We'll start at 8 PM. Please bring along a laptop with you!!!
General CTF Info
See the page for the Ctf-evenings Link to the Tech Inc Challenge Website Scoreboard: TechInc-CTF-Scoreboard
Notes
- 7 people present: some programmers, some sysadmins, some security folks
- We probably won't start out being very good -- BUT after the CTF events, we should analyse them, so we can improve.
Types of evenings
I envision the following kinds of CTF training evenings
- 1 - Learning evenings - network analysis/forensics (Wireshark), filesystem forensics, reversing/Pwnables(Ollydbg, etc..), code deobfuscation, pentesting (Nessus/Metasploit/stack overflows), cryptology, web security (XSS, SQL injection, etc..), stenography, recon/trivia/etc..
- Example: I've got a whole slew of Wireshark training videos - we can watch them together!
- 2 - Challenge website evenings
- I setup a scoreboard, so we can keep track of who's done which challenges
- 3 - Actual CTF events
- There's a bunch of them on CTF Time - we should participate!
- We can probably also join VUBAR when they are playing here! (Etienne said that this would probably be okay)
- We can also participate in own events, at other times..
Other things that we can do
- We could setup a vulnerable server (Damn Vulnerable Linux, etc..) and attack it