Ctf-evenings
Projects | |
---|---|
Participants | MRieback |
Skills | |
Status | Active |
Niche | Software |
Purpose | Fun |
Welcome to the Tech Inc Capture the Flag (CTF) training event series!
The format of this series is likely to evolve over time, but I currently assume that these evenings will feature a combination of web-based challenges, online competitions, and general-purpose learning/workshop evenings covering a variety of computer security (i.e. hacking, defensive) topics. Everyone of all skill levels is welcome!!!!
Contents
About the CTF Training Evenings
Types of evenings
I envision the following 3 kinds of CTF training evenings:
- 1 - Workshop/learning evenings - network analysis/forensics (Wireshark), filesystem forensics, reversing(Ollydbg, etc..)/Pwnables, code deobfuscation, pen testing (Kali-Backtrack/Metasploit/buffer overflows), cryptanalysis, web security (XSS, SQL injection, etc..), stegonography, Commandline kung-fu, recon/trivia/etc..
- Example: I've got a whole slew of Wireshark training videos - we can watch them together!
- We could also occasionally screen Defcon/CCC/Other videos on fun topics!
- 2 - Challenge website evenings
- I setup a Scoreboard, so we can keep track of who's done which challenges
- 3 - Actual CTF events
- Possible team name: Knuffelhackers
Other things that we can do
- Setup a vulnerable server (Damn Vulnerable Linux, Metasploitable, etc..) and attack it
- Other examples: http://exploit-exercises.com/
- Preparing for competitions
- Setup Etherpad (or another online "multiplayer notepad") so people can make notes and work together for each challenge
- Preparing tools (Backtrack VM, other VM images with different tools)
- Being able to emulate weird architectures for binaries
- Being able to test shellcode on our own system
- Maybe we can do something with hardware in the space (i have no idea what the status is of VMWare cluster in space, but i think we have one..)
- Brainsmoke could talk about binary exploitation
- We can also look at gdb / objdump / IDA / Hex-Rays
Challenge websites
Link to the Tech Inc Challenge Website Scoreboard: TechInc-CTF-Scoreboard
- http://captf.com/practice-ctf/
- http://ctf.forgottensec.com/wiki/
- http://www.overthewire.org/wargames/ (Bandit is good for beginners)
- https://www.certifiedsecure.com
- http://io.smashthestack.org
- http://ismellpackets.com/
- http://www.kroosec.com/?m=1
- http://exploit-exercises.com/fusion
- http://exploit-exercises.com/protostar
- http://opensecuritytraining.info/Training.html
- http://www.securitytreasurehunt.com/
- http://forensicscontest.com/
- http://ebctf.nl/challenges
- http://sourceforge.net/projects/owaspshepherd/files/ - VM
Reversing and Exploitation
- GDB Tips - Some beginning tips for how to use GDB
- https://www.securecoding.cert.org/confluence/display/seccode/CERT+C+Coding+Standard - Helpful for finding C constructs that can be exploited
- http://sourceware.org/gdb/current/onlinedocs/gdb/index.html - GDB manual
- http://sourceware.org/binutils/docs-2.24/binutils/index.html - GNU Binutils manual
- http://www.youtube.com/watch?v=gYOy7CGpPIU - The Making of Atlas: from Script Kiddie to Hacker in 5 Sleepless Nights (video)
- Hacking: The Art of Exploitation (book)
- Reversing: Secrets of Reverse Engineering (book)
- http://www.woodmann.com/fravia/howto1.htm
- http://www.woodmann.com/crackz/Orc.htm
Tools: objdump, readelf, gdb, ktrace/kdump
Setting up a CTF
http://ictf.cs.ucsb.edu/software.html http://www.cipher-ctf.org/Gameserver.php