Difference between revisions of "CTF-practice-evening:2014-04-14"
Line 26: | Line 26: | ||
* Vulnserver (practice server) | * Vulnserver (practice server) | ||
* The guys is using Spike (built into Kali Linux) to fuzz each of the commands on port 9999 | * The guys is using Spike (built into Kali Linux) to fuzz each of the commands on port 9999 | ||
+ | |||
+ | = Metasploit Megaprimer Videos = | ||
+ | |||
+ | * https://www.youtube.com/watch?v=W3X1YkYUUVc - Part I |
Revision as of 19:47, 14 April 2014
CTF-practice-evening:2014-04-14 | |
---|---|
Date | 2014/04/14 |
Time | |
Location | ACTA |
Type | Hackathon |
Contact | Melanie |
Contents
Capture The Flag evening - Part 14
- 14 April, 2014 - 7 PM
- Please bring along a laptop with you!!!
General CTF Info
- See the page for the Ctf-evenings
- Link to the Tech Inc Challenge Website Scoreboard
PlaidCTF
- Besides the WiCS players, only 3 people from Knuffelhackers showed up. That's kindof disappointing.. :-(
- There's also only 4 people at the training evening tonight. Maybe it's worth sending out an email to the CTF list to ask why people aren't coming…
Fuzzing w/ Spike
- Coolfire has prepared a training on fuzzing w/ Spike today!
- We are watching the video: From Fuzzing to Metasploit
- Vulnserver (practice server)
- The guys is using Spike (built into Kali Linux) to fuzz each of the commands on port 9999