Difference between revisions of "CTF-practice-evening:2014-04-14"
Line 20: | Line 20: | ||
* There's also only 4 people at the training evening tonight. Maybe it's worth sending out an email to the CTF list to ask why people aren't coming… | * There's also only 4 people at the training evening tonight. Maybe it's worth sending out an email to the CTF list to ask why people aren't coming… | ||
− | = Fuzzing w/ Spike = | + | = Metasploit + Fuzzing w/ Spike = |
* Coolfire has prepared the training for this evening! :-) | * Coolfire has prepared the training for this evening! :-) |
Revision as of 19:50, 14 April 2014
CTF-practice-evening:2014-04-14 | |
---|---|
Date | 2014/04/14 |
Time | |
Location | ACTA |
Type | Hackathon |
Contact | Melanie |
Contents
Capture The Flag evening - Part 14
- 14 April, 2014 - 7 PM
- Please bring along a laptop with you!!!
General CTF Info
- See the page for the Ctf-evenings
- Link to the Tech Inc Challenge Website Scoreboard
PlaidCTF
- Besides the WiCS players, only 3 people from Knuffelhackers showed up. That's kindof disappointing.. :-(
- There's also only 4 people at the training evening tonight. Maybe it's worth sending out an email to the CTF list to ask why people aren't coming…
Metasploit + Fuzzing w/ Spike
- Coolfire has prepared the training for this evening! :-)
- We watched the video: From Fuzzing to Metasploit
- They used Vulnserver (practice server)
- The guys is using Spike (built into Kali Linux) to fuzz each of the commands on port 9999
- He steps through how to use Metasploit to automate the full process