These Resources May Prove Beneficial When Competing in CTFs. These are in no particular order. https://uppusaikiran.github.io/hacking/Capture-the-Flag-CheatSheet/ https://github.com/uppusaikiran/awesome-ctf-cheatsheet/blob/master/readme.md#powershell https://trailofbits.github.io/ctf/forensics/ https://pentestlab.blog/2012/12/24/sql-injection-authentication-bypass-cheat-sheet/ https://gchq.github.io/CyberChef/ https://github.com/JohnHammond/ctf-katana https://dvd848.github.io/CTFs/CheatSheet.html https://gtfobins.org/ https://twin-security.com/ctf-cheatsheet/ https://github.com/LOLBAS-Project/LOLBAS https://thegrayarea.tech/steganography-ctf-cheat-sheet-b8ed69111857 https://sites.google.com/vt.edu/commonwealth-cyber-cup/ctf-resources https://github.com/RajChowdhury240/CTF-CheatSheet https://medium.com/@eRRoR_/the-ultimate-ctf-cheat-sheet-tools-techniques-and-one-liners-every-hacker-should-know-6d74091cf107 https://medium.com/@anandrishav2228/cryptography-great-cheat-sheet-for-ctfs-d2ada754b319…
Category: CTF
Capture The Flag and Other Security Competitions
The WIRED Guide to Digital Opsec for Teens | WIRED
Protecting your digital privacy isn’t a blanket prescription. Some people are more private by nature, and others prioritize putting themselves out there. But even if you’re a 24/7 streamer, you can still think about your operations security, commonly known as opsec. What can viewers see in your room while you’re streaming? Which people from your life have appeared onscreen? Could viewers figure out where you live from what they can see out your window?
US emergency alert systems down after cyberattack • The Register
Various municipalities have issued near-identical advisories about the attack on the OnSolve CodeRED platform, now owned by Crisis24, which enables residents to receive real-time alerts for emergencies such as weather warnings, missing children, terror threats, and more.
6 Networking Uses for the Linux nc Command
The netcat tool is quite popular among network administrators. However, it can also serve different purposes for you as a casual Linux user in your day-to-day life. While doing some research, I’ve found some great use cases to play with the nc command.
GoSearch: Open-source OSINT tool for uncovering digital footprints – Help Net Security
GoSearch incorporates data from Hudson Rock’s Cybercrime Database, offering detailed insights into potential cybercrime connections. It also draws from BreachDirectory.org and ProxyNova databases, providing extensive access to breached data, including plain-text and hashed passwords associated with usernames. For investigators who need reliable results without unnecessary complexity, GoSearch fits the bill.
Misconfig Mapper: Open-source tool to uncover security misconfigurations – Help Net Security
Misconfig Mapper is an open-source CLI tool built in Golang that discovers and enumerates instances of services used within your organization. It performs large-scale detection and misconfiguration assessments, leveraging customizable templates with detection and misconfiguration fingerprints to identify potential security risks in widely used third-party software and services.
OSINT Framework
Here is a useful collection of OSINT tools for CTFs and PenTesting. http://eastalcyber.com/MiscApps/CTF/osint/
I Started Playing CTFs and They Are My New Hobby
At its core, a CTF is both a learning tool and a game, making it a fun and interactive way to dive into cybersecurity, whether you’re a beginner or a seasoned professional. CTFs usually come in three categories: Jeopardy-style, Attack-defense, and Mixed or King of the Hill.