From Technologia Incognita
CTF-practice-evening:2014-02-24
|
Date
|
2014/02/24
|
Time
|
|
Location
|
ACTA
|
Type
|
Workshop
|
Contact
|
Melanie
|
Capture The Flag evening - Part 8
- 24 February, 2014 - 7 PM
- Please bring along a laptop with you!!!
General CTF Info
Codegate Retrospective
- We're happy with our performance at the Codegate CTF!
- Exploiting assembly code with a debugger is still one of our largest hurdles (with the exception of a few people)
- TODO Marielle: save a copy of the pad contents from Riseup.net before it disappears
- We need a better way of sharing stuff
- Dimitris setup some great infra, including a file uploader
- Melanie sent a link to the CTF mailing list with the URL and the login credentials
- Melanie wasn't able to successfully upload IDA Pro though -- file size limit issues
- Another limitation is that we can't arrange things into folders ourselves
- TODO Coolfile: setup a Knuffelhackers (FTP) server, since 2 options are better than 1 :-)
- During the next CTF, we should definitely use Dimitris' Etherpad infrastructure:
- Discussion of problems - we discussed: Weirdshark and 120
- The write-ups for Codegate on CTFtime.org still aren't available yet!
- We'll email a link to the write-ups when they are available, and can discuss them on the mailing list.
- IDA Pro was AWESOME for decompiling and reversing!!!
- We definitely need to have an IDA Pro reversing evening -- we'll plan this in
- But first we need to share it with everybody
- Melanie created a Windows VM with IDA. She can share it with everybody once the file sharing infrastructure is ready..
Binary Exploitation
- We're gonna look at Chapter 3 (Exploitation - start at Page 119) of this book: