Skip to content
This repository has been archived by the owner on Jun 30, 2021. It is now read-only.

WolvSec/Archived-WolvSec-Bootcamp

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

15 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Wolvsec Bootcamp

  1. Introduction
  2. Web Applications
  3. Reverse Engineering
  4. Binary Exploitation
  5. Cryptography
  6. Penetration Testing
  7. Slides

Introduction

Welcome to the Wolverine Security Capture The Flag bootcamp! We hope you will enjoy attacking software and systems. This document lists the topics covered during the bootcamp. Bootcamp duration can vary from 1 week long, to 1 semester. Stay tuned for upcoming events :)

Minimum tools required for CTFs can be found on our setup page (click here). Please install these before attending as the internet isn't always fast :(

Day 1: Web Application

  • Client side: HTML, CSS, JS
  • Server side: Java, PHP, Python, Ruby
  • Database: SQL, Mongo,
  • HTTP Protocol
    • Application Programming Interface (API)
  • Tools
    • Browser Proxies: Burp, ZAP
    • HTTP requests
  • Attacks in CTFs
    • XSS / Session Hijacking
    • SQL injection
    • IDOR
    • RCE
  • Advanced
    • Bypassing

Day 2: Reverse Engineering

  • File formats
  • Executable formats: ELF, PE, Mach-o, APK,...
  • Dynamic Loading: .so, DLL
  • Disassemblers: GHIDRA
    • Setup
  • Debuggers: gdb/gef, x64dbg
  • Patching
    • LD_PRELOAD
    • Breakpoints: 0xcc

Day 3: Binary Exploitation

  • Netcat
  • Stack overflow
    • Stack structure
    • Stack canaries
    • ROP chains
  • Format string
  • Heap overflow
    • Heap structure
    • Fastbin dup
    • Use After Free
    • Off-by-one
    • Unlink
    • House of force
  • Advanced
    • Integer overflow
    • IO_FILE
    • Kernel exploit

Day 4: Cryptography

  • Base64
  • Hashing
    • Merkle-Damgard
    • Length Extension
    • MD5
  • Classical
    • Caeser KCA, KPA, CPAA
    • Vigenere
  • Symmetric
    • XOR
    • ECB
    • CBC
  • Asymmetric
    • RSA
    • Diffie-Hellman

Day 5: Penetration Testing

  • Reconnaissance
    • nmap
  • Enumeration
  • Exploitation
    • Metasploit, exploit-db
  • Privilege Escalation
    • Linux
    • Windows
  • Post Exploitation
    • CNC

Slides

About

Archive of our old Bootcamp repo

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published