/iHack-Attack-Defense

Preparation of Attack & Defense CTF for iHack 2022

Primary LanguagePython

iHack 2022 Attack & Defense CTF

Overview

Vuln Services

Attacking

Tools

Network Monitor & Detection

Tools

Strategy

  • Incident Response
    • w
    • ps -aef --forest
    • ss -anp {PID}
    • kill -9 {PID}
    • cd /proc/{PID}; ls -al | grep cwd
    • tail /var/log/apache2/access.log
    • nohup tcpdump -i eth0 -w tcpdump.cap -s 0 &

Patching

Strategy

  • Rollout Patched Services
    • sudo docker-compose down
    • sudo docker-compose build
    • docker-compose up --force-recreate -d