User Tools

Site Tools


start

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
start [2019/09/23 19:58]
acm [Resources]
start [2019/10/23 10:16] (current)
acm [Resources]
Line 18: Line 18:
 or purpose of evasion. \\ or purpose of evasion. \\
 By these things, I stand. \\ By these things, I stand. \\
 +
 +I can /* not */ see this.
 ===== Meetings and Events ===== ===== Meetings and Events =====
  
Line 25: Line 27:
 === Our Github === === Our Github ===
   * https://github.com/brafaul/cyberAmbassdors   * https://github.com/brafaul/cyberAmbassdors
 +
 +=== Our Hackable Website ===
 +  * [[http://167.99.233.151|Find the Flags]]
 +    * 6 Challenges
 +    * 5 Flags in form of "utm{something}"
 +    * 1 password to crack 
 +
 === Vulnerable Machines and Training === === Vulnerable Machines and Training ===
   * https://www.vulnhub.com/   * https://www.vulnhub.com/
   * http://overthewire.org/wargames/   * http://overthewire.org/wargames/
 +  * [[https://trailofbits.github.io/ctf/|CTF Field Guide]]
 +  * [[https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE|PenTesting Bible]]
 +  * [[https://www.endgame.com/blog/technical-blog/how-get-started-ctf|How to get started in CTF]]
 +  * [[https://github.com/osirislab/CSAW-CTF-2019-Quals|CSAW 2019]]
  
 === Common Tools and Usage === === Common Tools and Usage ===
-[[metasploit|metasploit]]+  * [[metasploit|metasploit]] 
 +  * [[nmap|nmap]]
  
 === Binary Exploitation === === Binary Exploitation ===
 +  * [[https://old.liveoverflow.com/binary_hacking/|Live Overflow]] - Great Videos
 +  * [[https://null-byte.wonderhowto.com/how-to/exploit-development-learn-binary-exploitation-with-protostar-0181154/|Protostar Walkthrough]]
 +  * [[https://web.archive.org/web/20180828040052/https://exploit-exercises.com/|Exploit Exercises]]
 +  * [[https://exploit.education/|Exploit Education]]
 +  * [[https://practicalbinaryanalysis.com/|Binary Analysis Book]]
  
 === Cryptography === === Cryptography ===
Line 39: Line 58:
  
 === Web Exploitation === === Web Exploitation ===
 +  * Sometimes website have //secret// pages
 +
 +=== Buffer Overflow and Binary Exploitation ===
 +  * [[https://docs.google.com/presentation/d/1FBvIdmVWMmfi7hRa8EKFrViT-NNnJ8hIxVGtMVWIN88/edit?usp=sharing|Basic Buffer Overflow Presentation]]
  
 === Privilege Escalation === === Privilege Escalation ===
 +  * [[https://docs.oracle.com/cd/E19683-01/816-4883/6mb2joatb/index.html|Finding File with suid bit set]]
  
-=== Full System Exploitation Challenges ===+=== Other CTF and Hacking Team Pages === 
 +  * [[https://pwndevils.com/hacking/howtwohack.html|PwnDevils]]
  
 +=== Competitions ===
 +  * [[https://capturetheflag.withgoogle.com/#beginners/|Google CTF]]
 +  * [[https://0xbu.com/resources/#0xburesources|0xbu]]
 +
 +=== Books ===
 +  * Contact Brayden Faulkner about access to the Cyber Ambassador Library
 ===== Contacts ===== ===== Contacts =====
  
Line 51: Line 82:
 Chris Humphreys Chris Humphreys
 chrchump@ut.utm.edu chrchump@ut.utm.edu
 +
 +<nodisp>
 +hello?
 +</nodisp>
start.1569286713.txt.gz · Last modified: 2019/09/23 19:58 by acm