Best Tooling For CTF

CyberSecurity CTF Tools

In addition a knowledge of basic Linux commands, access to the following tools (or equivalent tools) are recommended as preparation for an entry level Capture-the-Flag (CTF) competition. Use what ever works for you!

  1. Steganography Tools:arrow-up-right

  2. Password Crackingarrow-up-right:

    1. Hash-Identifierarrow-up-right – Identifies hash type (Kali)

    2. Hashcatarrow-up-right – HASH cracking tool (Kali)

    3. Crackstation – Browser based Hash Cracker: (https://crackstation.net/arrow-up-right)

    4. John the Ripperarrow-up-right – Detect and crack weak PWs (Kali).

    5. Rockyou.txt WordListarrow-up-right (download) – contains 14m unique PWs (Kali).

  3. Web Exploitation:arrow-up-right

    1. /robots.txt – lists pages or files that search engines can’t request,

    2. Dirbusterarrow-up-rightbrute force discovery of hidden directories/files (Kali)

    3. Development Toolsarrow-up-rightBrowser option use to inspect source and cookies.

    4. User Agent Extension – allows browser to switch user agent .

  4. Scanning:arrow-up-right

    1. Nmaparrow-up-right – utility for network discovery and auditing

    2. Dirbusterarrow-up-right – Scan web sites for hidden web pages

    3. Metasploit Frameworkarrow-up-right – scan for known vulnerabilities (Kali)

    4. Recon-ngarrow-up-right – perform recon on remote targets (Kali).

    5. W3bin.comarrow-up-right – Info on who is hosting a website

  5. Network Traffic Analysisarrow-up-right:

    1. Wiresharkarrow-up-right – GUI based traffic capture and analysis tool (Kali, Windows or Mac OS).

    2. WinDumparrow-up-right – Windows version on tcpdump.

    3. ngreparrow-up-right – search for strings in network packets

  6. Enumeration and Exploitationarrow-up-right:arrow-up-right

    1. File’ Command – determine a file type (including executables)

    2. ‘Strings’ Command – Display text comments in an executable.

    3. Hex Editorarrow-up-right – view executable for visible text stings

    4. xxd -r’ arrow-up-rightCommand – convert a hex dump back to its original binary form

    5. Ghidraarrow-up-right – reverse engineering tool developed by the NSA

    6. Objdump -darrow-up-right – Linux command line dis-assembler

    7. Netcat arrow-up-right – utility that reads and writes data across network

    8. uncompyle6arrow-up-righttranslates Python bytecode back into source

    9. GDBarrow-up-right – Inspect memory w/in the code being debugged

    10. Pwntoolsarrow-up-right – a CTF framework and exploit development library.

  7. Wireless Exploitationarrow-up-right:

    1. Wigle.Netarrow-up-right – Wifi info database for hotspots from around the world

    2. Kali Linuxarrow-up-right – Linux suite of cybersecurity tools

    3. Wiresharkarrow-up-right – network packet analysis

    4. Aircrack- ngarrow-up-right – tools to assess WiFi network security

    5. ifconfigarrow-up-right‘ command – configure and query TCP/IParrow-up-right network interface parameters

    6. Stumblerarrow-up-right (set SSID to ANY) active mode (Windows)

    7. Kismetarrow-up-right : both war-drive and sniffer. Uses passive mode (Linux)

References:

Last updated