Freelearningtech
728 subscribers
296 photos
45 videos
163 files
1.21K links
Freelearningtech Is A Platform For Cybersecurity (Hacking), Networking, Digital Marketing, IT Courses... And Many More.

https://linktr.ee/freelearningtech

 
Download Telegram
πŸ”°What is CTF? πŸ”°

CTF (Capture The Flag) is a kind of information security competition that challenges contestants to solve a variety of tasks ranging from a scavenger hunt on wikipedia to basic programming exercises, to hacking your way into a server to steal data. In these challenges, the contestant is usually asked to find a specific piece of text that may be hidden on the server or behind a webpage. This goal is called the flag, hence the name! Like many competitions, the skill level for CTFs varies between the events. Some are targeted towards professionals with experience operating on cyber security teams. These typically offer a large cash reward and can be held at a specific physical location.

βž–βž–βž–βž–βž–βž–βž–βž–

https://t.me/joinchat/SLj_kg0Qz93pVTWM
πŸ”° How to solve CTF πŸ”°

Challenge types

Jeopardy style CTFs challenges are typically divided into categories. I'll try to briefly cover the common ones.

Cryptography - Typically involves decrypting or encrypting a piece of data

Steganography - Tasked with finding information hidden in files or images

Binary - Reverse engineering or exploiting a binary file

Web - Exploiting web pages to find the flag

Pwn - Exploiting a server to find the flag

Where do I start?

If I managed to pique your curiosity, I've compiled a list of resources that helped me get started learning. CTF veterans, feel free to add your own resources in the comments below!

Learning

http://ctfs.github.io/resources/ - Introduction to common CTF techniques such as cryptography, steganography, web exploits (Incomplete)

https://trailofbits.github.io/ctf/forensics/ - Tips and tricks relating to typical CTF challenges/scenarios

https://ctftime.org/writeups - Explanations of solutions to past CTF challenges

Resources

https://ctftime.org - CTF event tracker

https://github.com/apsdehal/awesome-ctf - Comprehensive list of tools and further reading

Tools (That I use often)

binwalk - Analyze and extract files

burp suite - Feature packed web penetration testing framework

stegsolve - Pass various filters over images to look for hidden text

GDB - Binary debugger

The command line :)

Practice

Many of the "official" CTFs hosted by universities and companies are time-limited competitions. There are many CTFs however that are online 24/7 that can be used as practice and learning tools. Here are some that I found to be friendly for beginners.

https://ctflearn.com - A collection of various user-submitted challenges aimed towards newcomers

https://overthewire.org/wargames/ - A series of progressively more difficult pwn-style challenges. (Start with the bandit series)

https://2018game.picoctf.com/ - Yearly time-limited CTF now available to use as practice

Conclusion

CTF is a great hobby for those interested in problem-solving and/or cyber security. The community is always welcoming and it can be a lot of fun tackling challenges with friends.
Thank you for reading!

βž–βž–βž–βž–βž–βž–βž–βž–
Social Engineering.pdf
70.6 KB
Support Us ❀️
Channel : @freelearningtech
Website : https://freelearningtech.in/

Join our discussion group

https://t.me/freelearningtech21
CompTIA Network+.pptx
26.8 MB
ComTIA N+ PPT


Support Us ❀️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
CompTIA A+.pptx
86.6 MB
Comptia A+ PPT

Support Us ❀️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
πŸ¦Ήβ€β™‚πŸ¦Ήβ€β™‚Web Intelligence
Researching DomainsπŸ¦Ήβ€β™‚πŸ¦Ήβ€β™‚

Web intelligence (WEBINT) is a means to efficiently identify the intelligence available in open source (OSINT). Structuring and visualizing web-based information allows an analyst to surface tactical information like technical indicators, and strategic understandings like the swaying sentiment of a troubled region.

🍎Tools Link 🍎
🍏Access Check https://accesscheck.thenetmonitor.org
🍏AFRINIC https://www.afrinic.net
🍏APNIC https://www.apnic.net
🍏ARIN https://www.arin.net
🍏 Website Search Tool https://www.aware-online.com/osint-tools/website-search-tool
🍏Better Whois http://www.betterwhois.com
🍏Central Ops http://centralops.net
🍏Complete DNS https://completedns.com
🍏Daily Changes http://dailychanges.domaintools.com
🍏Danger Zone https://github.com/woj-ciech/Danger-zone
🍏Da.whois https://dawhois.com
🍏Dedicated or Not http://dedicatedornot.com
🍏Denic web whois https://www.denic.de/webwhois
🍏DNSDumpster https://dnsdumpster.com
🍏DNS History http://dnshistory.org
🍏DNS Lookup https://dnslookup.online
🍏DNSlytics https://dnslytics.com
🍏dnspop https://github.com/bitquark/dnspop
🍏DNS Queries https://www.dnsqueries.com
🍏dnsrecon https://github.com/darkoperator/dnsrecon
🍏DNS Root Instances https://atlas.ripe.net/results/maps/root-instances
🍏DNSSec Analyzer https://dnssec-analyzer.verisignlabs.com
🍏IMK-CREDITS
https://bio.cool/itsmekali
🍏DNS Spy
https://dnsspy.io
🍏DNSStuff http://www.dnsstuff.com
🍏DNSTools http://www.dnstools.ch
🍏DNS Trails http://dnstrails.com
🍏DNS Trails https://securitytrails.com/dns-trails
🍏dnstwist https://github.com/elceef/dnstwist
🍏dnstwist
https://dnstwist.it
🍏dnstwister https://dnstwister.report
🍏DNSViz
http://dnsviz.net
🍏Domain Big Data http://domainbigdata.com
🍏Domain Crawler http://www.domaincrawler.com
🍏Domain Dossier http://centralops.net/co/DomainDossier.aspx
🍏Domain Eye https://domaineye.com
🍏DomainIQ https://www.domainiq.com
🍏Domain SDB https://domainsdb.info
🍏Domain To IP Converter http://domaintoipconverter.com
🍏Domain Tools https://www.domaintools.com
🍏Domain Tools http://whois.domaintools.com
🍏DomEye https://xaviesteve.com/domeye
🍏downdetector http://downdetector.com
🍏downforeveryoneorjustme http://downforeveryoneorjustme.com
🍏DNS Checker https://dnschecker.org
🍏DShield API https://isc.sans.edu/api
🍏EasyCounter WHois https://whois.easycounter.com
🍏Easy whois https://www.easywhois.com
🍏Educause Whois Lookup https://net.educause.edu/whois.htm
🍏Geektools http://www.geektools.com/whois.php
🍏Lookup https://www.infobyip.com/ipbulklookup.php
🍏Network Tools http://network-tools.com
🍏NS.Tools
https://ns.tools
Onyphe https://www.onyphe.io
🍏OpenData Rapid7 https://opendata.rapid7.com
🍏The Prefix Whois Project https://pwhois.org
🍏PTRArchive http://ptrarchive.com
🍏Purplepee.com https://purplepee.co
🍏RedirectDetective http://redirectdetective.com


Enjoy πŸ‘



Support Us ❀️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
❀1
Security+.pdf
60.2 MB
❀️❀️ Enjoy and Share ❀️❀️

Support Us ❀️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Bots - Traffic - Automatic Tools.rar
788 MB
❀️❀️ Enjoy and Share ❀️❀️

Support Us ❀️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Here we share now How to do Bug hunting step wise checked pinned messages regularly


Bug hunting Step one Choose your Target which have huge list of subdomains and subdomains is eligible in Scope

Like you have seen a two targets

1. www.example.com

Another one is shown like this

2.*. example.com

Then you choose the second one

Here is two website where you can find subdomains easily


https://chaos.projectdiscovery.io/#/


https://subdomainfinder.c99.nl/


❀️❀️ Enjoy and Share ❀️❀️

Support Us ❀️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Freelearningtech pinned Β«Here we share now How to do Bug hunting step wise checked pinned messages regularly Bug hunting Step one Choose your Target which have huge list of subdomains and subdomains is eligible in Scope Like you have seen a two targets 1. www.example.com Another…»
Top 50 Linux Commands You Must Know as a Regular User 🐧

1. ls - view contents of directory (list)

2. pwd - path of the current directory

3. cd - change directoryn

4. mkdir - make new directory

5. mv - move files / rename files

6. cp - copy files

7. rm - remove files

8. touch - create blank new file

9. rmdir - delete directory

10. cat - list content of file to terminal

11. clear - clear terminal window

12. echo - move data into a file

13. less - Read text file one screen at a time

14. man - show manual of Linux commands

15. sudo - enables you to perform tasks that require administrative or root permissions

16. top - task manager in terminal

17. tar - used to archive multiple files into a tarball

18. grep - used to searching words in specific files

19. head - view first lines of any text file

20. tail - view last lines of any text file

21. diff - compares the contents of two files line by line

22. kill - used for killing unresponsive program

23. jobs - display all current jobs along with their statuses

24. sort - is a command line utility for sorting lines of text files

25. df - info about system disk

26. du - check how much space a file or directory takes

27. zip - to compress your files into a zip archive

28. unzip - to extract the zipped files from a zip archive

29. ssh - a secure encrypted connection between two hosts over and insecure network

30. cal - shows calendar

31. apt - command line tool for interaction with packaging system

32. alias - custom shortcuts used to represent a command

33. w - current user info

34. whereis - used to locate the binary, source, manual page files

35. whatis - used to get one-line man page description

36. useradd - used to create a new user

37. passwd - used to changing password of current user

38. whoami - print current user

39. uptime - print current time when machine starts

40. free - print free disk space info

41. history - print used commands history

42. uname - print detailed information about your Linux system

43. ping - to check connectivity status to a server

44. chmod - to change permissions of files and directories

45. chown - to change ownership of files and directories

46. find - using find searches for files and directories

47. locate - used to locate a file, just like the search command in Windows

48. ifconfig - print ip address stuff

49. ip a - similar to ifconfig but shortest print

50. finger - gives you a short dump of info about a user


❀️❀️ Enjoy and Share ❀️❀️

Share and support us ❀️
Channel :
@freelearningtech
Group :
@freelearningtech21
Website :
https://freelearningtech.in/
Recon is most important part for bug hunting

Here we share now How to do Bug hunting step wise checked pinned messages regularly

How to get Subdomains list vai some tools

First you find Subdomains vai subfinder or sublist3r its your choice

Command - python3 sublist3r.py -d example.com -b -t 150 -p 80,443,20,21

Tool Link - https://github.com/aboul3la/Sublist3r

Command - subfinder -d example.com -t 150 -v -o /root/Desktop/subdomainlist1.txt (put a path where you can save output)

Tool Link - https://github.com/projectdiscovery/subfinder

After finding subdomains you can do subdomain bruteforce vai amass

Must set api key of Virustotal and censys

Config file Link - https://gist.github.com/PatrikFehrenbach/33ec3724884a3557a3015718dd796fbf

Command - amass enum -src -ip -brute -d example.com -o /root/Desktop/subdomainlist2.txt (put a path where you can save output)

Make a crt.sh file for finding more subdomains

Tool link - https://github.com/appsecco/the-art-of-subdomain-enumeration/blob/master/crtsh_enum_psql.sh

Code -

#!/bin/sh

# Script by Hanno Bock - https://github.com/hannob/tlshelpers/blob/master/getsubdomain

query="SELECT ci.NAME_VALUE NAME_VALUE FROM certificate_identity ci WHERE ci.NAME_TYPE = 'dNSName' AND reverse(lower(ci.NAME_VALUE)) LIKE reverse(lower('%.$1'));"

echo $query | \
psql -t -h crt.sh -p 5432 -U guest certwatch | \
sed -e 's:^ *::g' -e 's:^*\.::g' -e '/^$/d' | \
sort -u | sed -e 's:*.::g'

Save that file as a name crt.sh

Command - ./crt.sh example.com > /root/Desktop/subdomainlist3.txt (put a path where you can save output)

After that sort a subdomains for all files like this

Command - sort subdomainlist1.txt subdomainlist2.txt subdomainlist2.txt | uniq -u > /root/Desktop/finalsubdomains.txt (put a path where you can save output)


❀️❀️ Enjoy and Share ❀️❀️

Share and support us ❀️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Freelearningtech pinned Β«Recon is most important part for bug hunting Here we share now How to do Bug hunting step wise checked pinned messages regularly How to get Subdomains list vai some tools First you find Subdomains vai subfinder or sublist3r its your choice Command - python3…»
Freelearningtech pinned Deleted message