Skip to content

Latest commit

 

History

History
49 lines (41 loc) · 3.34 KB

File metadata and controls

49 lines (41 loc) · 3.34 KB

Resources for CTFs

General

Web Security

Binary Exploitation

  • REFE (Materials for the IAP 2017 Reverse Engineering for Exploitation course)
  • microcorruption (series of challenges teaching basics of binary exploits)
  • RPI Course (course at RPI about binary exploitation)
  • Exploit exercises (a set of wargames)

Reverse Engineering

  • radare2: (also known as r2) is a complete framework for reverse-engineering and analyzing binaries; composed of a set of small utilities that can be used together or independently from the command line.

  • x86 Assembly Guide

  • gdb reference sheet

    • GDB extensions you need:
    • Voltron improves the user experience of various debuggers (LLDB, GDB, VDB and WinDbg) by enabling the attachment of utility views that can retrieve and display data from the debugger host.
    • Peda enhances the GDB display and adds useful commands
  • ELF file description

Cryptography

Forensics

  • Forensics Wiki
  • Wireshark is the de-facto tool for analyzing packet captures (pcap files).
  • binwalk is a tool for searching a given binary image for embedded files and executable code. Specifically, it is designed for identifying files and code embedded inside of firmware images.
  • Sleuth Kit is a collection of command line tools and a C library that allows you to analyze disk images and recover files from them. It is used behind the scenes in Autopsy and many other open source and commercial forensics tools.

MIT Resources

  • 6.004 - Computation Structures (Covers Assembly)
  • 6.857 - Computer and Network Security (Covers Cryptography)
  • 6.858 - Computer Systems Security (Covers Binary Exploitation, Web Security)
  • 6.875 - Cryptography and Cryptanalysis (Very theoretical, mostly useless for ctfs)