Difference between revisions of "CTF-practice-evening:2013-12-09"
Line 23: | Line 23: | ||
I envision the following kinds of CTF | I envision the following kinds of CTF | ||
* 1 - Informatie evenings (Wireshark, Ollydbg, Nessus/Metasploit) | * 1 - Informatie evenings (Wireshark, Ollydbg, Nessus/Metasploit) | ||
− | ** Wireshark training | + | ** I've got a whole slew of Wireshark training videos - we can watch them together! |
* 2 - Challenge website evenings | * 2 - Challenge website evenings | ||
− | ** I will setup a scoreboard | + | ** I will setup a scoreboard, so we can keep track of who's done what |
* 3 - Actual CTF events | * 3 - Actual CTF events |
Revision as of 20:35, 9 December 2013
CTF-practice-evening:2013-12-09 | |
---|---|
Date | 2013/12/09 |
Time | |
Location | Tech Inc |
Type | Workshop |
Contact | Melanie |
9 December, 2013 - 8 PM
Capture The Flag evening - Part I
We'll start at 8 PM. Please bring along a laptop with you!!!
General CTF Info
See the page for the Ctf-evenings
Notes
- 7 people present: some programmers, some sysadmins, some security folks
Types of evenings
I envision the following kinds of CTF
- 1 - Informatie evenings (Wireshark, Ollydbg, Nessus/Metasploit)
- I've got a whole slew of Wireshark training videos - we can watch them together!
- 2 - Challenge website evenings
- I will setup a scoreboard, so we can keep track of who's done what
- 3 - Actual CTF events
- There's a bunch of them on CTF Time - we should participate!
- We can probably also join VUBAR when they are playing here! (Etienne said that this would probably be okay)
- We probably won't start out being very good -- BUT after the CTF events, we should analyse them, so we can improve.
- We could setup a vulnerable server (Damn Vulnerable Linux, etc..) and play with attacking it