Difference between revisions of "CTF-practice-evening:2014-04-14"

From Technologia Incognita
Jump to: navigation, search
Line 22: Line 22:
 
= Fuzzing w/ Spike =
 
= Fuzzing w/ Spike =
  
* Coolfire has prepared a training on fuzzing w/ Spike today!
+
* Coolfire has prepared the training for this evening!   :-)
* We are watching the video: [https://www.youtube.com/watch?v=DHvHGwczsMY From Fuzzing to Metasploit]
+
* We watched the video: [https://www.youtube.com/watch?v=DHvHGwczsMY From Fuzzing to Metasploit]
* Vulnserver (practice server)
+
* They used Vulnserver (practice server)
 
* The guys is using Spike (built into Kali Linux) to fuzz each of the commands on port 9999
 
* The guys is using Spike (built into Kali Linux) to fuzz each of the commands on port 9999
 +
* He steps through how to use Metasploit to automate the full process
  
 
= Metasploit Megaprimer Videos =
 
= Metasploit Megaprimer Videos =
  
 
* [https://www.youtube.com/watch?v=W3X1YkYUUVc Part I]
 
* [https://www.youtube.com/watch?v=W3X1YkYUUVc Part I]

Revision as of 20:50, 14 April 2014

CTF-practice-evening:2014-04-14
Date 2014/04/14
Time
Location ACTA
Type Hackathon
Contact Melanie

Capture The Flag evening - Part 14

  • 14 April, 2014 - 7 PM
  • Please bring along a laptop with you!!!

General CTF Info

PlaidCTF

  • Besides the WiCS players, only 3 people from Knuffelhackers showed up. That's kindof disappointing..  :-(
  • There's also only 4 people at the training evening tonight. Maybe it's worth sending out an email to the CTF list to ask why people aren't coming…

Fuzzing w/ Spike

  • Coolfire has prepared the training for this evening!  :-)
  • We watched the video: From Fuzzing to Metasploit
  • They used Vulnserver (practice server)
  • The guys is using Spike (built into Kali Linux) to fuzz each of the commands on port 9999
  • He steps through how to use Metasploit to automate the full process

Metasploit Megaprimer Videos