Sign in to follow this
Followers
0
-
Similar Content
-
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. Sub3 Suite is a research-grade suite of tools for Subdomain Enumeration, OSINT Information gathering & Attack Surface Mapping. Supports both manual and automated analysis on a variety of target types with many available features & tools.
Use Cases
These enumerations processes can be used for offensive & defensive cyber operations, Bug-Bounty hunting & Research. Multiple techniques are normally used by multiple tools to attain this goal. sub3suite combines these different techniques and provides you with multiple capability tools into one suite for effective enumeration both manually and automatically.
General Concepts
Passive Subdomain Enumeration.
Active Subdomain Enumeration.
OSINT (Open-source intelligence).
OSINT Information gathering.
Target Mapping.
Changelog v0.0.4
changed ACTIVE Tool to HOST Tool.
changed no longer use the term ENGINES now its TOOLS
added IP Tool
added Ping feature for HOST & IP tools.
added light theme
added hostname querying in URL Tool
fix unwanted selection in results tree views
fix json highlighter
fix hackertarget crashing OSINT Tool on hostsearch
Hidden Content
Give reaction to this post to see the hidden content. -
By dEEpEst
How to solve CTF
Challenge types
Jeopardy style CTFs challenges are typically divided into categories. I'll try to briefly cover the common ones.
Cryptography - Typically involves decrypting or encrypting a piece of data
Steganography - Tasked with finding information hidden in files or images
Binary - Reverse engineering or exploiting a binary file
Web - Exploiting web pages to find the flag
Pwn - Exploiting a server to find the flag
Where do I start?
If I managed to pique your curiosity, I've compiled a list of resources that helped me get started learning. CTF veterans, feel free to add your own resources in the comments below!
Learning
http://ctfs.github.io/resources/ - Introduction to common CTF techniques such as cryptography, steganography, web exploits (Incomplete)
https://trailofbits.github.io/ctf/forensics/ - Tips and tricks relating to typical CTF challenges/scenarios
https://ctftime.org/writeups - Explanations of solutions to past CTF challenges
Resources
https://ctftime.org - CTF event tracker
https://github.com/apsdehal/awesome-ctf - Comprehensive list of tools and further reading
Tools (That I use often)
binwalk - Analyze and extract files
burp suite - Feature packed web penetration testing framework
stegsolve - Pass various filters over images to look for hidden text
GDB - Binary debugger
The command line 🙂
Practice
Many of the "official" CTFs hosted by universities and companies are time-limited competitions. There are many CTFs however that are online 24/7 that can be used as practice and learning tools. Here are some that I found to be friendly for beginners.
https://ctflearn.com - A collection of various user-submitted challenges aimed towards newcomers
https://overthewire.org/wargames/ - A series of progressively more difficult pwn-style challenges. (Start with the bandit series)
https://2018game.picoctf.com/ - Yearly time-limited CTF now available to use as practice
Conclusion
CTF is a great hobby for those interested in problem-solving and/or cyber security. The community is always welcoming and it can be a lot of fun tackling challenges with friends.
Thank you for reading!
-
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. black-widow is one of the most useful, powerful, and complete offensive penetration testing tools.
It provides easy ways to execute many kinds of information gatherings and attacks.
Fully Open Source
Written in Python
Continuously updated and extended
Hidden Content
Give reaction to this post to see the hidden content.
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. Folder Lock®Version 7
Bullet-Proof Data Encryption
- Lock folders in seconds
- Encrypt files on-the-fly
- Sync & Backup Encrypted files
- Password-protect USB/External Drive
- Shred and permanently delete files and so much more…
Hidden Content
Give reaction to this post to see the hidden content.
Hidden Content
Give reaction to this post to see the hidden content.
-