CTF - Guide To Practice

Agenda

  1. Find a Job
  2. Rules & Challenges
    • Recon
    • Web Vulnerabilities
    • Pwnable
    • Cryptography
    • Forensic
  3. Show case: SQL Injection

src: https://trailofbits.github.io/ctf/intro/careers.html

Career Opportunities

Role & Available Positions

  • Application Security (code audits/app assessments)
  • Attacker (offensive)
  • Compliance
  • Forensics
  • Incident Handler
  • Manager
  • Network Security Engineer
  • Penetration Tester
  • Policy
  • Researcher
  • Reverse Engineer
  • Security Architect

src: https://trailofbits.github.io/ctf/intro/careers.html

Meet People

  1. Get a club (school club) - Share your workloads.
  2. Learn from friends. Learn by doing.
  3. Attend to local meeting organized by Big Players for career opportunities.  (VNISA, BKAV)
  4. Follow international conferences for vulnerabilities trending (BlackHat USA DefCon)

If you think 4 steps are too much works. Go read step 1.

Capture The Flag

If you want to acquire and maintain technical skills and you want to do it fast, then you should play in a CTF or jump into a wargame

In general, it is far more productive to spend time playing in a CTF, then using your final standing as proof that you're capable.

- Trail of Bits Guide

Again, Why CTF ?

  • "World Cup" For Hackers.
  • Best defend = think offensively.
  • Divided into 2 main categories:
    • Jeopardy . Question & Answer format
    • Attack - Defense. Patching & Attack Format
  • Famous CTF games are beneficial.

Jeopardy

  • Challenge-based format.
  • Online-competitions.
    • Recon
    • Web App
    • Cryptography
    • Pwnable
    • Reverse Engineering
    • Forensic (Network/File)

 

  • Duration: 4 Hours - 2 Days
  • Solve the challenges to get the flag.
  • Flag format depends on event type.
    • Ex: D4y_L4_Fl@g_va_no_0_co_space
    • Ex: CTF{Day_Cung_l@_1_Flag}
    • Ex: Flag_202cb96

Learn from write-ups is encouraged.

Reconnaissance

  • Related Fields: Business Intelligence, Network Intelligence, Search Engine Hacking, FOCA, DNS Reconnaissance, Network Scanning.
  • Conan-based challenges. Finding information by observations.
  • Tools Recommendation
    • Facebook/ Linked in/ Twitter Search
    • Bing/ Google search
    • Recon-ng (framework)
  • CTF games that have Recon
  • Ex: http://ctf-for-beginners.blogspot.com/2015/09/write-up-csaw-ctf-2015-recon-alexander.html

 

  • Practice: http://hackeracademy.com/module/business-intelligence

Web Vulnerabilities

  • Auditing Web App. Familiar with OWASP.
  • Top 10 - 2013. (Still Valid till now)
  • Ex. http://resources.infosecinstitute.com/n00bz-ctf-challenge-2-practical-website-hacking/

Pwnable

  • Read the binary source code & Reverse/Exploit the Operation.
  • Very Tricky. Including Buffer Overflow, String format (Remmember CWE 170? ).
  • Tools & Knowledge Recommendations.
    • Assembly Language
    • Control the EIP (Extended Instruction Pointer)
    • Debuggers: GDB, PEDA
    • Disassemblers: IDA-PRO, objdump
    • Radare2 (Reversing Framework)

 

  • Ex: https://ctf-team.vulnhub.com/picoctf-2014-no-overflow/
  • Ex: https://ctf-team.vulnhub.com/backdoor-ctf-2015-forgot/

Cryptography

  • Given a string, decode it
  • Encrypted methods:
    • Transposition:
      • Rail Fence
    • Substitution
      • Mono-Alphabetic Cipher: Same substitutions will be used.
        • Caesar. Ex. A will be encrypted with K
      • Poly-Alphabetic Cipher: Different substitutions will be used.
        • Vigenere. Ex. A can be encrypted with K, S.
    • Other:
      • Base64, ROT13, Dancing Man (Sherlock Home)
      • Visual Cryptography, Steganography

T  I  I  A  E  R  T

H  S  S  S  C  E

TIIAERTHSSSCE

encrypted text

Forensic

  • Given a file, a packet or an image, find the flag
  • Information are hidden within the given file,
  • Tools & Knowledge Recommendation
    • Common File Structure (PNG, JPEG, BMP, GIF, EXE, RAR)
    • HexEditor
    • File Inspection:
      • binwalk/ strings/ file/ grep
      • pngcheck for meta-data & filter type check
    • Steganography Inspection:
      • StegExpose for LSB check/ Stegsolve.
      • foremost for embedded files.
    • Network Traffic Sniffing:
      • wireshark/tshark/tcpdump

Show time !

Topology

  1. Automated Scan with SQLMap
  2. Manual Error-based SQL Injection

source: medium.com

Made with Slides.com