http://ctf365.com/ http://www.enigmagroup.org/ http://captf.com/practice-ctf/ https://www.hacking-lab.com/index.html https://microcorruption.com/login https://pentesterlab.com/ http://www.thisislegal.com/ http://captf.com/ http://io.smashthestack.org/ http://www.wechall.net/ http://repo.shell-storm.org/CTF/ http://exploit-exercises.com/ http://overthewire.org/wargames/ http://www.smashthestack.org/ http://www.crackmes.de/ http://amanhardikar.com/mindmaps/Practice.html http://www.gh0st.net http://www.root-me.org/?lang=en
Twitter: @lokut
This blog is for educational purposes only. The opinions expressed in this blog are my own and do not reflect the views of my employers.
Wednesday, August 20, 2014
List of Various CTF Sites
This list was provided by a friend of a variety of Capture the Flag events.
Subscribe to:
Post Comments (Atom)
Test Authentication from Linux Console using python3 pexpect
Working with the IT420 lab, you will discover that we need to discover a vulnerable user account. The following python3 script uses the pex...
-
Here is a quick walk through of GetBoo. The first item that I found was you can harvest the usernames of the existing users that are regist...
-
As I was glancing through the logs of my honeypots I spent some time to look at the following logs. In the past I have just overlooked them...
-
I ran a Nikto scan and found the following vulnerability in the report that it produces: "OSVDB-637: Enumeration of users is possible...
-
I thought I would work through a few of these web applications provided by OWASP on their broken web applications VM. The first one I th...
-
In the honeypot I found over 276 requests for cgi files that could be accessed to leverage the shellshock vulnerability documented as CVE-20...
No comments:
Post a Comment