- Introduction
- Web Applications
- Reverse Engineering
- Binary Exploitation
- Cryptography
- Penetration Testing
- Slides
Welcome to the Wolverine Security Capture The Flag bootcamp! We hope you will enjoy attacking software and systems. This document lists the topics covered during the bootcamp. Bootcamp duration can vary from 1 week long, to 1 semester. Stay tuned for upcoming events :)
Minimum tools required for CTFs can be found on our setup page (click here). Please install these before attending as the internet isn't always fast :(
- Client side: HTML, CSS, JS
- Server side: Java, PHP, Python, Ruby
- Database: SQL, Mongo,
- HTTP Protocol
- Application Programming Interface (API)
- Tools
- Browser Proxies: Burp, ZAP
- HTTP requests
- Attacks in CTFs
- XSS / Session Hijacking
- SQL injection
- IDOR
- RCE
- Advanced
- Bypassing
- File formats
- Executable formats: ELF, PE, Mach-o, APK,...
- Dynamic Loading: .so, DLL
- Disassemblers: GHIDRA
- Setup
- Debuggers: gdb/gef, x64dbg
- Patching
- LD_PRELOAD
- Breakpoints: 0xcc
- Netcat
- Stack overflow
- Stack structure
- Stack canaries
- ROP chains
- Format string
- Heap overflow
- Heap structure
- Fastbin dup
- Use After Free
- Off-by-one
- Unlink
- House of force
- Advanced
- Integer overflow
- IO_FILE
- Kernel exploit
- Base64
- Hashing
- Merkle-Damgard
- Length Extension
- MD5
- Classical
- Caeser KCA, KPA, CPAA
- Vigenere
- Symmetric
- XOR
- ECB
- CBC
- Asymmetric
- RSA
- Diffie-Hellman
- Reconnaissance
- nmap
- Enumeration
- Exploitation
- Metasploit, exploit-db
- Privilege Escalation
- Linux
- Windows
- Post Exploitation
- CNC