Skip to content
This repository has been archived by the owner on Jun 30, 2021. It is now read-only.

Latest commit

 

History

History
106 lines (88 loc) · 2.47 KB

README.md

File metadata and controls

106 lines (88 loc) · 2.47 KB

Wolvsec Bootcamp

  1. Introduction
  2. Web Applications
  3. Reverse Engineering
  4. Binary Exploitation
  5. Cryptography
  6. Penetration Testing
  7. Slides

Introduction

Welcome to the Wolverine Security Capture The Flag bootcamp! We hope you will enjoy attacking software and systems. This document lists the topics covered during the bootcamp. Bootcamp duration can vary from 1 week long, to 1 semester. Stay tuned for upcoming events :)

Minimum tools required for CTFs can be found on our setup page (click here). Please install these before attending as the internet isn't always fast :(

Day 1: Web Application

  • Client side: HTML, CSS, JS
  • Server side: Java, PHP, Python, Ruby
  • Database: SQL, Mongo,
  • HTTP Protocol
    • Application Programming Interface (API)
  • Tools
    • Browser Proxies: Burp, ZAP
    • HTTP requests
  • Attacks in CTFs
    • XSS / Session Hijacking
    • SQL injection
    • IDOR
    • RCE
  • Advanced
    • Bypassing

Day 2: Reverse Engineering

  • File formats
  • Executable formats: ELF, PE, Mach-o, APK,...
  • Dynamic Loading: .so, DLL
  • Disassemblers: GHIDRA
    • Setup
  • Debuggers: gdb/gef, x64dbg
  • Patching
    • LD_PRELOAD
    • Breakpoints: 0xcc

Day 3: Binary Exploitation

  • Netcat
  • Stack overflow
    • Stack structure
    • Stack canaries
    • ROP chains
  • Format string
  • Heap overflow
    • Heap structure
    • Fastbin dup
    • Use After Free
    • Off-by-one
    • Unlink
    • House of force
  • Advanced
    • Integer overflow
    • IO_FILE
    • Kernel exploit

Day 4: Cryptography

  • Base64
  • Hashing
    • Merkle-Damgard
    • Length Extension
    • MD5
  • Classical
    • Caeser KCA, KPA, CPAA
    • Vigenere
  • Symmetric
    • XOR
    • ECB
    • CBC
  • Asymmetric
    • RSA
    • Diffie-Hellman

Day 5: Penetration Testing

  • Reconnaissance
    • nmap
  • Enumeration
  • Exploitation
    • Metasploit, exploit-db
  • Privilege Escalation
    • Linux
    • Windows
  • Post Exploitation
    • CNC

Slides