This is my first time ever doing CTF challenges. ဒီ Repo မှာဆိုရင် ကျွန်တော် MCSC2023 CTF Challenge အတွက်ပြင်ဆင်ခဲ့တဲ့ MarkDown Notes လေးတွေကို Sharing လုပ်ထားပါတယ်။ (But our team failed at this challenge).
Fun Fact : Unexpected Questions
- WebSecurity
- Cryptography
- Forensics
- Binary Exploits (Pwns)
- Reverse Enginnering
This is guide line video for ctf challenge by MMCERT teams. Join this Telegram Group First - https://t.me/ctfguide
- Day 1 (Pwn)
- Day 2 (Web)
- Day 3 (Reverse Enginnering)
- Day 4 (Network Forensics)
- Day 5 (Cryptography)
- Day 6 (Pwn)
- Day 7 (Web)
- Day 8 (Network Forensics)
- Day 9 (Cryptography)
- Day 10 (Reverse Enginnering)
- Nmap - Network Discovery and security auditing
- Masscan - Mass IP port scanner, TCP port scanner
- Wireshark - Analyze the network dumps.
- BurpSuite – A graphical tool to testing website security.
- Commix – Automated All-in-One OS Command Injection and Exploitation Tool.
- Hackbar – Firefox addon for easy web exploitation
- OWASP ZAP – Intercepting proxy to replay, debug, and fuzz HTTP requests and responses
- SQLMap – Automatic SQL injection and database takeover tooli
- XSSer – Automated XSS tester
- FeatherDuster – An automated, modular cryptanalysis tool
- Hash Extender – A utility tool for performing hash length extension attacks
- PkCrack – A tool for Breaking PkZip-encryption
- RSACTFTool – A tool for recovering RSA private key with various attack
- RSATool – Generate private key with knowledge of p and q
- XORTool – A tool to analyze multi-byte xor cipher
- Ghidra - Software for reverse engineering
- Hashcat - Password Cracker
- John The Ripper - Password Cracker
- Seclist - Wordlist
- Pwntools - CTF Framework for writing exploits
- Metasploit - Penetration testing Software