arrow-left

All pages
gitbookPowered by GitBook
1 of 1

Loading...

Best Tooling For CTF

CyberSecurity CTF Tools

In addition a knowledge of basic Linux commands, access to the following tools (or equivalent tools) are recommended as preparation for an entry level Capture-the-Flag (CTF) competition. Use what ever works for you!

  1. General Competition Toolsarrow-up-right:

    • Barrow-up-right

    • – Lightweight SSH Browser addon:

    • :

      • ( Binary, Octal, Decimal, Hex)

  2. :

    • Google, ,

    • – Domain owners, name servers info, IP addresses

    • – web-based open-source port of StegSolve.

    • – browser based hex editor

    • – Calculate exclusive ‘OR’ operation

    • – Shift Cipher

  3. :

    1. – Identifies hash type (Kali)

    2. – HASH cracking tool (Kali)

    1. /robots.txt – lists pages or files that search engines can’t request,

    2. – brute force discovery of hidden directories/files (Kali)

    • See

    1. – utility for network discovery and auditing

    2. – Scan web sites for hidden web pages

  4. :

    1. – GUI based traffic capture and analysis tool (Kali, Windows or Mac OS).

    2. – utility for Linux

    1. ‘File’ Command – determine a file type (including executables)

    2. ‘Strings’ Command – Display text comments in an executable.

  5. :

    1. – Wifi info database for hotspots from around the world

    2. – Linux suite of cybersecurity tools

hashtag
References:

  • (Hex, Decimal, Binary)

  • (Text, Hex, Video, Audio, etc. )

  • – Base2 to Base36 Converter

  • – Host name, IP , DNS and registry information

  • – Image Meta Data info

  • ‘‘ – Linux command to view visible text characters

  • ‘‘ – Linux command to extract embedded files and executables

  • – hide/extract files from inside an image

  • – open source steganography software (Linux)

  • – a free steganography tool written in Java (Linux).

  • – look for/correct broken chunks.

  • – Geo Explore Colour & Bit Planes (Go to “Browse Bit Planes”)

  • – Shift Cipher

  • – Replace Letters with Numbers

  • (requires a key)

  • ()

  • Crackstation – Browser based Hash Cracker: ()

  • – calculates/verifies 128-bit ,

  • – Detect and crack weak PWs (Kali).

  • (download) – contains 14m unique PWs (Kali).

  • – Browser option use to inspect source and cookies.

  • User Agent Extension – allows browser to switch user agent .

  • – scan for known vulnerabilities (Kali)

  • – perform recon on remote targets (Kali).

  • – Info on who is hosting a website

  • – Windows version on tcpdump.

  • – search for strings in network packets

  • – view executable for visible text stings

  • ‘Command – convert a hex dump back to its original binary form

  • – reverse engineering tool developed by the NSA

  • – Linux command line dis-assembler

  • – utility that reads and writes data across network

  • – translates Python bytecode back into source

  • – Inspect memory w/in the code being debugged

  • – a CTF framework and exploit development library.

  • – network packet analysis

  • – tools to assess WiFi network security

  • ‘‘ command – configure and query network interface parameters

  • (set SSID to ANY) active mode (Windows)

  • : both war-drive and sniffer. Uses passive mode (Linux)

  • asic Linux Commandsarrow-up-right
    Kali Linuxarrow-up-right
    Google Chrome SSHarrow-up-right
    Number / Text Conversion Toolsarrow-up-right
    Number Converterarrow-up-right
    Hex to ASCII (text)arrow-up-right
    Open Source Intelligencearrow-up-right
    Google Mapsarrow-up-right
    Google Dorks (operators)arrow-up-right
    whois.domaintools.comarrow-up-right
    Steganography Tools:arrow-up-right
    StegOnlinearrow-up-right
    Hex Editorarrow-up-right
    Crytography Decoders:arrow-up-right
    XOR Decorderarrow-up-right
    Caesar Cipherarrow-up-right
    Password Crackingarrow-up-right
    Hash-Identifierarrow-up-right
    Hashcatarrow-up-right
    Web Exploitation:arrow-up-right
    Dirbusterarrow-up-right
    Log Analysis:arrow-up-right
    Basic Linux Commandsarrow-up-right
    Scanning:arrow-up-right
    Nmaparrow-up-right
    Dirbusterarrow-up-right
    Network Traffic Analysisarrow-up-right
    Wiresharkarrow-up-right
    tcpdumparrow-up-right
    packet analyzerarrow-up-right
    command linearrow-up-right
    Enumeration and Exploitationarrow-up-right
    :arrow-up-right
    Wireless Exploitationarrow-up-right
    Wigle.Netarrow-up-right
    Kali Linuxarrow-up-right
    Basic Cyber Competition Skill Domainsarrow-up-right
    Cybersecurity Capture-the-flag (CTF) Competition Tipsarrow-up-right
    CTF101 – Cryptographyarrow-up-right
    Binary to Textarrow-up-right
    Text to Numbersarrow-up-right
    Base64 arrow-up-right
    Base2-Base36arrow-up-right
    www.robtex.comarrow-up-right
    Jeffrey’s Image Meta Data Viewerarrow-up-right
    stringsarrow-up-right
    binwalkarrow-up-right
    Digital Invisible Ink Toolkitarrow-up-right
    Steghidearrow-up-right
    Stegosuitearrow-up-right
    pngcheckarrow-up-right
    GeorgeOM.netarrow-up-right
    ROT13arrow-up-right
    A1Z26arrow-up-right
    Vigenere Cipher arrow-up-right
    Atbash Cipher (simple)arrow-up-right
    Vernanarrow-up-right
    One-time Padarrow-up-right
    Rail Fence Cipher (ZigZag)arrow-up-right
    https://crackstation.net/arrow-up-right
    md5sumarrow-up-right
    MD5arrow-up-right
    hashesarrow-up-right
    John the Ripperarrow-up-right
    Rockyou.txt WordListarrow-up-right
    Development Toolsarrow-up-right
    Metasploit Frameworkarrow-up-right
    Recon-ngarrow-up-right
    W3bin.comarrow-up-right
    WinDumparrow-up-right
    ngreparrow-up-right
    Hex Editorarrow-up-right
    xxd -r’ arrow-up-right
    Ghidraarrow-up-right
    Objdump -darrow-up-right
    Netcat arrow-up-right
    uncompyle6arrow-up-right
    GDBarrow-up-right
    Pwntoolsarrow-up-right
    Wiresharkarrow-up-right
    Aircrack- ngarrow-up-right
    ifconfigarrow-up-right
    TCP/IParrow-up-right
    Stumblerarrow-up-right
    Kismetarrow-up-right
    CTF101 – Forensicsarrow-up-right
    CTF101 – Web Exploitationarrow-up-right
    CTF101 – Reverse Engineeringarrow-up-right
    CTF101 – Binary Exploitationarrow-up-right