CTF-practice-evening:2014-04-14: Difference between revisions

From Technologia Incognita
Jump to navigation Jump to search
MRieback (talk | contribs)
No edit summary
MRieback (talk | contribs)
No edit summary
Line 26: Line 26:
* Vulnserver (practice server)
* Vulnserver (practice server)
* The guys is using Spike (built into Kali Linux) to fuzz each of the commands on port 9999
* The guys is using Spike (built into Kali Linux) to fuzz each of the commands on port 9999
= Metasploit Megaprimer Videos =
* https://www.youtube.com/watch?v=W3X1YkYUUVc - Part I

Revision as of 20:47, 14 April 2014


CTF-practice-evening:2014-04-14
Date 2014/04/14
Time
Location ACTA
Type Hackathon
Contact Melanie
iCalendar Add to calendar

Capture The Flag evening - Part 14

  • 14 April, 2014 - 7 PM
  • Please bring along a laptop with you!!!

General CTF Info

PlaidCTF

  • Besides the WiCS players, only 3 people from Knuffelhackers showed up. That's kindof disappointing..  :-(
  • There's also only 4 people at the training evening tonight. Maybe it's worth sending out an email to the CTF list to ask why people aren't coming…

Fuzzing w/ Spike

  • Coolfire has prepared a training on fuzzing w/ Spike today!
  • We are watching the video: From Fuzzing to Metasploit
  • Vulnserver (practice server)
  • The guys is using Spike (built into Kali Linux) to fuzz each of the commands on port 9999

Metasploit Megaprimer Videos