A crash course on the reverse engineering tool Ghidra
GHIDRA is a tool created by the NSA that allows the user to analyze binaries. It is well known for it’s incredible de compiler which converts the assembly in the binary to C.
The GHIDRA download can be found here.
Note: Assembly and C knowledge are highly recommended
Note: Ghidra requires an semi-new version of java(11+). If you do not have the jre or the jdk, you can install it with
sudo apt install openjdk-13-jre openjdk-13-jdk
Once you’ve unzipped the ghidra folder and downloaded java, you should see a file structure…
Perform memory forensics to find the flags
Perform memory forensics to find the flags. If you are having trouble, maybe check out the volatility room first.
Please note: The size of the attached vmem file to download for each Task is large: 1.07 GB.
Here are some resources I used, check them out for more information:
Volatility wiki: https://github.com/volatilityfoundation/volatility/wiki
Room icon credit: https://book.cyberyozh.com/counter-forensics-anti-computer-forensics
1.I have understood the task and can continue to the questions!
A:no answer need
The forensic investigator on-site has performed the initial forensic analysis of John’s computer and handed you the memory…
Learn about and use Hydra, a fast network logon cracker, to bruteforce and obtain a website’s credentials.
Hydra is a brute force online password cracking program; a quick system login password ‘hacking’ tool.
We can use Hydra to run through a list and ‘bruteforce’ some authentication service. Imagine trying to manually guess someones password on a particular service (SSH, Web Application Form, FTP or SNMP) — we can use Hydra to run through a password list and speed this process up for us, determining the correct password.
Hydra has the ability to bruteforce the following protocols: Asterisk, AFP, Cisco AAA…
An introduction to Windows
On November 20, 1985 Microsoft announced its operating system named Windows which was a graphical operating system shell as a response to growing GUIs (graphical user interfaces). At the moment Windows dominates the word of computers with around 90% market share and it overtook Apple (Mac OS) which was introduced in 1984.
To exploit a website, you first need to know how they are created.
By the end of this room, you’ll know how websites are created and will be introduced to some basic security issues.
When you visit a website your browser (like Safari or Google Chrome) makes a request to a web server asking for information about the page you’re visiting and will respond with data that your browser uses to show you the page; a web server is just a dedicated computer somewhere else in the world that handles your requests.
Collecting your collection of hacker tools is excellent, but now it is customary to take one of the specialized distributions as a basis. Usually it is Kali Linux, but we will consider not only it, but also other operating systems for hacking (pentest), sometimes no less effective, and in some areas more useful.
There are many operating systems for hacking. Some are popular, others are not very, but they all aim to give the hacker a convenient, universal and reliable tool for all occasions. …
SSL issues are still lurking in the wild. Can you exploit this web servers OpenSSL?
Introduction to Heartbleed and SSL/TLS
On the internet today, most web servers are configured to use SSL/TLS. SSL(secure socket layer) is just a predecessor to TLS(transport layer security). The most common versions are TLS 1.2 and TLS 1.3(which has recently been released). Configuring a web server to use TLS means that all communication from that particular server to a client will be encrypted; any malicious third party that has access to this traffic will not be able to understand/decrypt the traffic, and they also will…
A crash course on the topic of steganography
Steganography(Stego) is the art of concealing something inside something else, for example: A message inside a jpg file, or a binary inside a png. Stego has been used since ancient times to deliver messages that they don’t want others seeing. In the modern day it’s used for the same purpose, only now we have much more advanced tools. This room is designed to go over those tools and how to use them.
All needed files can be found inside the included zip file
Note: Basic linux knowledge required.
Steghide is one of…
A guided room taking you through infiltrating and exploiting a Linux system.
Hello there my name is Pingu. I’ve come here to put in a request to get my fish back! My dad recently banned me from eating fish, as I wasn’t eating my vegetables. He locked all the fish in a chest, and hid the key on my old pc, that he recently repurposed into a server. As all penguins are natural experts in penetration testing, I figured I could get the key myself! Unfortunately he banned every IP from Antarctica, so I am unable to do anything to…
A beginner orienteered guide on using the Tor network
Tor is a free and open-source software for enabling anonymous communication. Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace Internet activity to the user: this includes “visits to Web sites, online posts, instant messages, and other communication forms”. …