big commit

This commit is contained in:
stephensottosanti
2021-02-06 14:55:12 -06:00
parent 90d829237c
commit 23572e4b15
32 changed files with 244 additions and 102 deletions

View File

@@ -7,7 +7,7 @@ You won't find a better place full of videos to get you started than YouTube. So
with great content and individuals that wan't to educate others and teach people the important aspects with great content and individuals that wan't to educate others and teach people the important aspects
of the cyber security world. The following are links to youtube videos that are worth checking out! of the cyber security world. The following are links to youtube videos that are worth checking out!
### <b>What is Cybersecurtiy?</b> ### <b>What is Cyber Securtiy?</b>
"Cyber security is the practice of protecting systems, networks, and programs from digital attacks. These "Cyber security is the practice of protecting systems, networks, and programs from digital attacks. These
cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money
from users; or interrupting normal business processes. from users; or interrupting normal business processes.
@@ -20,13 +20,13 @@ devices than people, and attackers are becoming more innovative." - CISCO<br>
Learn From YouTube:<br> Learn From YouTube:<br>
[What is Cybersecurity?](https://www.youtube.com/watch?v=2mh-N9_O_yI)<br> [What is Cyber Security?](https://www.youtube.com/watch?v=2mh-N9_O_yI)<br>
Cyberactive Security<br> Cyberactive Security<br>
[Cybersecurity 101](https://www.youtube.com/watch?v=sdpxddDzXfE)<br> [Cyber Security 101](https://www.youtube.com/watch?v=sdpxddDzXfE)<br>
NOVA PBS Official<br> NOVA PBS Official<br>
[Why Cybersecurity is Important!](https://www.youtube.com/watch?v=JIJslcA8Q5g)<br> [Why Cyber Security is Important!](https://www.youtube.com/watch?v=JIJslcA8Q5g)<br>
TEDx Talks<br> TEDx Talks<br>
[Beginner Tips, Certifications and Career Paths](https://www.youtube.com/watch?v=xzDKM7eEweI)<br> [Beginner Tips, Certifications and Career Paths](https://www.youtube.com/watch?v=xzDKM7eEweI)<br>

View File

@@ -1 +0,0 @@
# Capture The Flag

View File

@@ -1 +0,0 @@
# Courses

View File

@@ -4,16 +4,15 @@ For a team that lives in the deep dark corners of the dark web, The Crimson Defe
## The Team ## The Team
<b>percyKnox</b> <br> <b>percyKnox</b> <br>
I am an old white lady who loves to eat chocolate, but only if it's a "giant" bar. The other ones just aren't as good. I started hacking in my early 60s, I want to say 63 but I could be wrong; It was so many years ago. It all started when I was at a Chinese restaurant and I opened up my fortune cookie and it said "you will be pwned in the near future". I immediately went home to my Ubuntu machine and starting securing the heck out of it. I don't know where I learned all the commands to be honest, they just came to me naturally. I spent 1000 hours, without getting up, making sure my system was as secure as it can be. A few days later I was pwned. I have since then spent every day practicing my security hardening skills and have never eaten at another Chinese restaurant again.<br>
<b>inspectElement</b><br> <b>inspectElement</b><br>
I live, laugh, love the web.
<b>guiltyRemnant</b><br> <b>guiltyRemnant</b><br>
<b>ACHME</b><br> <b>ACHME</b><br>
<b>AlluringPanda</b><br> <b>alluringPanda</b><br>
<b>LOR</b><b> <b>LOR</b><b>

View File

@@ -1,26 +1,51 @@
# The Dark Web # The Dark Web
If you were able to attend the meeting in which we talked all about the internet ans the dark web then go ahead and download the resources here that will get you on to the dark web. There is also a text file with .onion URLs that we discussed during the meeting. If you did not attend the meeting then I reccommend you read what is below to get a decent understanding of how all of this works and what it means to access the dark web. <br> If you were able to attend the meeting in which we talked all about the internet ans the dark web then go ahead and download the resources here that will get you on to the dark web. There is also a text file with .onion URLs that we discussed during the meeting. If you did not attend the meeting then I recommend you read what is below to get a decent understanding of how all of this works and what it means to access the dark web. <br>
## Resources ## Resources
Link to download TOR browser:<br> Link to download TOR browser:<br>
[TOR Browser](https://www.torproject.org/)<br> [TOR Browser](https://www.torproject.org/)<br>
<br> <br>
Link to download TAILS. Follow the instructions on how to verify your downlaod:<br> Link to download TAILS. Follow the instructions on how to verify your download:<br>
[TAILS](https://tails.boum.org/install/)<br> [TAILS](https://tails.boum.org/install/)<br>
<br> <br>
For those curious, TAILS will help you become more anonymous if you are trying to be extra careful when on the dark web. I have TOR on my mac and I use it to access the dark web when I'm bored or want to access a specific site with a little more anonymity. <br> For those curious, TAILS will help you become more anonymous if you are trying to be extra careful when on the dark web. I have TOR on my mac and I use it to access the dark web when I'm bored or want to access a specific site with a little more anonymity. <br>
<br>
## Google as a Browser ## Google as a Browser
Google sells ads not only on their search engine, but also on over 2.2 million other websites and over 1 million apps. Every time you visit one of these sites or apps, Google is storing that information and using it to target ads at you. A quick alternative can be to switch to Firefox. Firefox keeps very little data on you and blocks third-partie's tracking cookies by default. Firefox is not watching you. <br> Google sells ads not only on their search engine, but also on over 2.2 million other websites and over 1 million apps. Every time you visit one of these sites or apps, Google is storing that information and using it to target ads at you. A quick alternative can be to switch to Firefox. Firefox keeps very little data on you and blocks third-parties tracking cookies by default. Firefox is not watching you. <br>
<br>
## Google as a Search Engine ## Google as a Search Engine
Search engines are your second gate keepers to the internet, right after your ISP. Google tweaks what and how results appear on the page, which changes how you think. Average users don't understand just how much google knows about them. It goes against what search engines are made for, providing organic search results. Organic search result is refferring to how all pages are indexed based on the search term and the content of the website alone and they are ranked according to how well these two parameters match. <br> Search engines are your second gate keepers to the internet, right after your ISP. Google tweaks what and how results appear on the page, which changes how you think. Average users don't understand just how much google knows about them. It goes against what search engines are made for, providing organic search results. Organic search result is referring to how all pages are indexed based on the search term and the content of the website alone and they are ranked according to how well these two parameters match. <br>
See for yourself. Go ahead and google "is google manipulating search results" on google.com and then search it again on another search engine such as duckduckgo.com and take a look at the difference. Google places content they want above the organic search results, making you scroll and making it more difficult to get to the organic results. <br> See for yourself. Go ahead and google "is google manipulating search results" on google.com and then search it again on another search engine such as duckduckgo.com and take a look at the difference. Google places content they want above the organic search results, making you scroll and making it more difficult to get to the organic results. <br>
You can switch to a private search engine such as Duck Duck Go. They are great! They block sites from tracking you, and they don't keep any data on you. They don't care where you're going. <br>
<br>
## Incognito Mode ## Incognito Mode
If you were wondering why ads still follow you around when you are in incognito mode it is because incognito mode only deletes your local search and browsing history, just the content on your computer. Websites, search engines, internet service providers, and governments can still easily track you accross the web. <br> If you were wondering why ads still follow you around when you are in incognito mode it is because incognito mode only deletes your local search and browsing history, just the content on your computer. Websites, search engines, internet service providers, and governments can still easily track you across the web. <br>
<br>
## Virtual Private Network ## Virtual Private Network
VPNs, do you know what they really do? VPNs, do you know what they really do? <br>
Your ISP (Internet Service Provider) can see the domain name of the site that you are visiting and there could be very good reason to hide those. Domain name refers to the main name of the site. So if you go to, this isn't a real site, https://YouTube.com/something/interesting/watchtv?=aerSnfSLflag{you_found_me}F9u$34t9g then the only thing that your ISP is going to see is that you went to YouTube.com, which is meta data. Your country may allow ISPs to sell that data to advertisers to build up a profile on you. Or maybe you are studying at a fundamentalists Christian college and you don't want the university administrators knowing that you are questioning your faith or your sexuality. Or maybe, your government is blocking adult type content and you want to get around it. <br>
If you are getting a VPN because you are concerned that your ISP is reading your messages well then you don't need to get one. As long as there is a padlock in the browser, typically right to the left of the URL, then your data is encrypted. If you are using any modern app then again, your data is encrypted. If you do use a VPN, all you are doing is changing who can see that meta data. Now what your ISP sees is the location of the server of the VPN that you are using. If you don't trust your ISP, why do you trust your VPN Service? There are many VPN services that have been hacked and caught logging without permission. If you decide to use a VPN then make sure you do your research on the company. Many of them are in it for the money. <br>
Many of the claims VPN services use to reel you in are a load of cr*p. If they say that they don't log your data no matter what, then that would be crazy. If that were true then their services would immediately be used for criminal activity and if they told you that they do log all of your data then they are going to get no customers. You just have to make sure they don't log your data without your permission. And if they do, people will eventually find out and they will go bankrupt. <br>
Another thing they'll use to try and reel you in is they will say that they use military grade encryption. This is AES, advanced encryption standard, and it is used on almost every site now by default. Don't believe me? Go to YouTube and click on the padlock in the browser and then click on the arrow next to "connection secure" and then click on more information. That's right, they use military grade encryption as well, pretty crazy right?! Unless you are being targeted by the government, using a VPN doesn't make your passwords and financial data any more safe. They are already pretty safe. <br>
You may be wondering, "Hey person who created this github who's name shall never be revealed, when is a good time to use a VPN?". Well, assuming that you did your research and found a VPN that you can trust then a good time to use one would be if want to hide your identity and pretend you are in another country, torrent whatever you want, and if you want to download the last season of Game of Thrones. And if you are wondering if the government is going to serve a gag order for you because you downloaded a whole season of Game of Thrones then worry not! Believe it or not the government has more important things to do. <br>
So just keep the following in mind. VPNs are useful, but not for everyday internet activity. Your ISP such as Verizon has no interest other than collecting your data, such as domain names you visit. But that is something that they need because they need to send that information to a DNS server which then fins the IP address for the URL that you are trying to visit. Also, can you trust the VPN service you are using? My intention isn't to scare you into never going on the internet again, it is just to inform you on what is happening. You deserve to know, we all deserve to know. Our privacy is our right and there are things in which we would rather the world not know. And like I mentioned earlier your messages are now encrypted by default so no one can read the entire data that is being sent when you are visiting a website, just the domain name. <br>
When searching for a VPN service to use keep the following in mind. Your VPN is owned by a private corporation. Your VPN provider determines the available servers. Your VPN provider has no proof that they keep your data safe; And your VPN provider is in control of the entire traffic. Have fun researching!! :) <br>
You can also set up your own VPN and it would actually cost less than paying for a VPN service, but that's its own presentation. Let me know if that is something you would be interested in learning more about, if you even know who this is. <br>
## The Internet
The internet was actually coined for a short word for inter-networking. The internet is a huge system of interconnected intranets or computer networks from all over the globe. The internet supports lots of different services, just one of which is the world wide web.

View File

@@ -1,52 +0,0 @@
# Kali Linux
Here you will find instructions on how to download and setup your very own Kali Linux machine: <br>
<br>
If you are unfamiliar with what virtualbox, Linux, and Kali Linux are, then head on over to the "where to start" directory where I have added some great links to videos and readings on those topics. I'll even give you a link right to it, here: [Let's Learn](/0_Where_To_Start) <br>
<br>
## Before you get started
Before you get started, I recommend downloading a download manager. It is not necessary but can be helpful. You can download a popular and free one called [Free Download Manager](https://www.freedownloadmanager.org/). I mean, that name could not be better. If you ever google "hey I want a free download manger", boom that's the first thing that is going to pop up. If you're not sure why you should get it maybe this article will help. <br>
[Why You Should use a Download Manager](https://www.hellotech.com/blog/use-download-managers)<br>
<br>
## Virtualbox
If you don't already have virtualbox then go ahead and download it. We all use it so if you have any trouble with it don't be afraid to ask for help! <br>
[VirtualBox](https://www.virtualbox.org/) <br>
<br>
## Kali Linux
Once you have Virtualbox downloaded it is time to download Kali Linux. Scroll down to the machine images and click the + button on the virtualbox images tab. Download the OVA file and double-click to open it. It will open virtualbox for you and then click "import" and wait for it to download. <br>
[Kali Linux](https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox-image-download/#1572305786534-030ce714-cc3b)<br>
<br>
## After You Import Kali
The default user has been changed to a standard, unprivileged user. The default username and password are both "kali".<br>
Prevent Kali from going idle:
- Click on the power button (top right), then "Power Manager Settings", and then Display
- Change all of them to "never"
- Go to security, change the same thing, if you want to.
To change the password:
- sudo su (su meaning switch user)
- Type in the password ("kali")
- passwd root (we are changing the password for the root user, you.)
- type in your new password
Now it is time to update. You will need to be patient for this step. Open up a terminal and type in the following:
- apt update && apt -y full-upgrade
<br>
After all of that you should be set. When powering down the machine do not use the x button in the corner. Doing that is like pulling the plug on your computer when it is on. You are going to go to virtualbox, right click on the machine, then close, then power off.<br>
<br>
## Windows won't let you power on Kali Linux?
If you are using Windows then you might come across an error in which the machine won't even start. Does it say something like "Failed to open a session for the virtual machine"? If so, try the following and see if it fixes the issue. If it doesn't fix the issue then you can always message in the general slack and ask for help!<br>
What you are going to want to do is first close out your virtual machine manager, in this case it should be virtualbox. Go to Windows Search and type in "features". Click on "Turn Windows features on or off". Now you are going to disable the following. If any of them are already disabled, then you can skip those:
- Virtual Machine Platform
- Windows Defender Application Guard
- Windows Hypervisor Platform
- Windows Sandbox
Click ok and restart your computer.

View File

@@ -1 +0,0 @@
# Popular Resources

40
Practice/README.md Normal file
View File

@@ -0,0 +1,40 @@
# Practice
I'm just going to paste a bunch of sites. I'll fix it up and make it look nice some time next week.
Stay up to date with the world of linux:<br>
https://www.linux.com/ <br>
<br>
Learn about current cyber security news <br>
https://www.reuters.com/news/archive/cybersecurity <br>
<br>
Learn hands on cyber security techinques. The virtual machines for this site are already in the Virtual Machine directory with the directions on how to install them. Yeah I know, I'm awesome. <br>
https://seedsecuritylabs.org/index.html <br>
<br>
The following is a link to a website in which you can buy some great course and learn a whole lot. Don't <b>EVER</b> pay full price for a course. Just put it in your wishlist, wait a few days, and then check again; There will be a sale. I should make a rule where if you pay full price for a course you have to sit out of the next competition meeting. <br>
https://www.udemy.com/ <br>
<br>
Practice your cyber security skills. <br>
https://0x00sec.org/ <br>
Core hacking course on youtube <br>
https://www.youtube.com/playlist?list=PLMGUdaTHpFQLmSAk5_cTM8Y502hhVpeNf <br>
<br>
Linux Commands <br>
https://www.mediacollege.com/linux/command/linux-command.html <br>
<br>
Web hacking <br>
https://www.pentesterlab.com/ <br>
https://www.hackthissite.org/ <br>
<br>
Over the wire wargames<br>
https://overthewire.org/wargames/ <br>

View File

@@ -1,8 +1,15 @@
# The University of Alabama's Cyber Security Club # The University of Alabama's Cyber Security Club
Welcome to the Crimson Defense github for Crimson Cyber Defense club members and individuals interested in learning more about Cyber Security! Welcome to the Crimson Defense GitHub for Crimson Cyber Defense club members and individuals interested in learning more about Cyber Security!
Here you will find everything you need when it comes to learning more about Cyber Security. There is information and resources for beginners up Here you will find everything you need when it comes to learning more about Cyber Security. There is information and resources for beginners up to advanced individuals who are looking to learn more and advance their skills in Cyber Security! Please make sure you carefully read all READMEs in every repository as they all contain important information that could help with finding certain resources and getting things set up properly!<br>
up to advanced individuals who are looking to learn more and advance their skills in cyber security! Please make sure you carefully read all READMEs <br>
in every repository as they all contain important information that could help with finding certain resources and getting things set up properly!
Crimson Defense was established with three main goals in mind:<br>
- Teach real Cyber Security that's applicable in the field (penetration testing, malware analysis, etc.)
- Bring together a group that advocates and promote the Cyber Security degree, major, and specialization within the Computer Science Department
- Compete in Cyber security competitions at the local, state, and national level
<br>
DISCLAIMER: Using security techniques with malicious intent will result in your removal from Crimson Defense. If applicable, you will be reported to the appropriate authorities. Do not abuse your power, WE ARE NOT A HACKTIVIST GROUP.
<p align="center"> <p align="center">
<img width="350px" src="00_Archive/images/318feea7cf1545feb4dcfd711f64b263.png" alt="Logo"/> <img width="350px" src="00_Archive/images/318feea7cf1545feb4dcfd711f64b263.png" alt="Logo"/>
@@ -13,38 +20,32 @@ in every repository as they all contain important information that could help wi
<b>Website:</b> uacrimsondefense.github.io<br> <b>Website:</b> uacrimsondefense.github.io<br>
<br> <br>
## <b>Crimson Cyber Defense Competition Team<b>
Everyone from begginer level to advanced are welcome and encouraged to join the competition team. It is a great opportunity to learn more about cyber security and really dive deep into what it takes to solve complex cyber security problems. Here you will find resources on CTFs and other competitions. New to cyber competitions? Check out the resources within the [Where_to_Start](/Competition_Team/0_Where_to_Start) directory.<br/>
## [Meet the Crimson Defense H@ckers](/Crimson_Defense_H@ckers) ## [Meet the Crimson Defense H@ckers](/Crimson_Defense_H@ckers)
The competition team is comprised of individuals motivated and driven to protect the world from any potential exploit or vulnerability. While both focused on hardening systems and pen-testing systems to make sure they are as secure as they can be, the Crimson Defense H@ckers work tirelessly day in and day out. They are an elite security group and there isn't a problem too difficult for them to solve. Head over to the Crimson Defense H@ckers directory and meet the team! The competition team is comprised of individuals motivated and driven to protect the world from any potential exploit or vulnerability. While both focused on hardening systems and pen-testing systems to make sure they are as secure as they can be, the Crimson Defense H@ckers work tirelessly day in and day out. They are an elite security group and there isn't a problem too difficult for them to solve. Head over to the Crimson Defense H@ckers directory and meet the team!
## <b>Before You Start!<b>
If you are looking to start solving your own challenges and learning about how to compete, if you do not already have a virtual machine set up to where you can solve these challenges go ahead and checkout the [Virtual Machines](Virtual_Machines) and follow the instructions on how to set up your own Ubuntu, Kali Linux, or Parrot OS virtual machine!
## [Where do I even start?](/0_Where_To_Start) ## [Where do I even start?](/0_Where_To_Start)
One of most puzzling things to figure out, especially when trying to start learning about cybersecurity. There is so much to learn, which is one of the reasons why it is so great. But with there being so much information out there it can be hard to figure out where to even begin. This folder will help those brand new to cybersecurity. Individuals who have little to no experience and want to get started but don't know where to go. Hopefully the resources here will help you understand what cybersecurity is all about.<br><br> One of most puzzling things to figure out, especially when trying to start learning about Cyber Security. There is so much to learn, which is one of the reasons why it is so great. But with there being so much information out there it can be hard to figure out where to even begin. This folder will help those brand new to Cyber Security. Individuals who have little to no experience and want to get started but don't know where to go. Hopefully the resources here will help you understand what Cyber Security is all about.<br><br>
## [I'm new but I'm not brand new, you know?](/1_Beginner) ## [I'm new but I'm not brand new, you know?](/1_Beginner)
After learning the basics and having an understanding of what cybersecurity is, it is time to start diving deeper and learning all about the different aspects of cybersecurity.<br> After learning the basics and having an understanding of what Cyber Security is, it is time to start diving deeper and learning all about the different aspects of Cyber Security.<br><br>
# Crimson Cyber Defense Competition Team ## [I want to get a certification](/Security+More)
Welcome! Everyone from begginer level to advanced are welcome and encouraged to join There are many certifications to choose from. Check out the Security+ directory and see which one grabs your attention!<br><br>
the competition team. It is a great opportunity to learn more about cyber security
and really dive deep into what it takes to solve complex cyber security problems.
Here you will find resources on CTFs and other competitions. New to cyber competitions?
Check out the resources within the [Where_to_Start](/Competition_Team/0_Where_to_Start) directory.<br/>
# Before You Start! ## [CTF](/CTF)
If you are looking to start solving your own challenges and learning about how to compete, Capture the flag events are a lot of fun. They test your skills across 5 main topics. These topics are Forensics, Cryptography, Web Exploitation, Reverse Engineering, and Binary Exploitation.<br>
if you do not already have a virtual machine set up to where you can solve these challenges
go ahead and checkout the [kali directory](/Kali_Linux) and follow the instructions on how to set
up your own kali linux virtual machine!
# CTF Checkout each individual CTF topic's directory and learn more about them and find out which tools you can be using right now to help you with solving CTF challenges!<br>
CTF stands for Capture The Flag. If you didn't know, now you know.
# Tools Different topics you might come across in a CTF event include:<br>
Checkout each individual CTF topic's directory and learn more about them and find out [Forensics](/CTF/Forensics)<br>
which tools you can be using right now to help you with solving CTF challenges!<br/> [Cryptography](/CTF/Cryptography)<br>
[Web Exploitation](/CTF/Web_Exploitation)<br>
Different topics you might come across in a CTF event include:<br/> [Reverse Engineering](/CTF/Reverse_Engineering)<br>
[Forensics](/CTF/Forensics)<br/> [Binary Exploitation](/CTF/Binary_Exploitation)<br>
[Cryptography](/CTF/Cryptography)<br/>
[Web Exploitation](/CTF/Web_Exploitation)<br/>
[Reverse Engineering](/CTF/Reverse_Engineering)<br/>
[Binary Exploitation](/CTF/Binary_Exploitation)<br/>

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

19
Skills/README.md Normal file
View File

@@ -0,0 +1,19 @@
# Skills
Throughout your next few years here at Alabama and your career, that is if you decide to pursue a career in Cyber Security, you are going to be competing at some point. Competitions are a great way to show off your skills, see if you can think outside the box, and learn something new. When it comes to Cyber Security, you will never know everything. Always keep an open mind and be willing to listen to what others have to say. A majority of the time they know something that you don't know and vice versa.<br>
When learning about competitions you will probably here terms thrown out such as defense, offense, and CTF. Defense refers to hardening systems and trying to prevent others from braking into your machine. Offense refers to finding vulnerabilities and exploits in machines that will let you use them to break into the machine and gain control. CTF refers to capture the flag competitions which will test your skills across a variety of Cyber Security topics. CTFs are mainly difficult because they involve topics that are so vastly different from each other that it is very hard to be advanced in each and every one. <br>
Capture the flag events are a lot of fun. They test your skills across 5 main topics. These topics are Forensics, Cryptography, Web Exploitation, Reverse Engineering, and Binary Exploitation.<br>
Checkout each individual CTF topic's directory and learn more about them and find out which tools you can be using right now to help you with solving CTF challenges!<br>
Different topics you might come across in a CTF event include:<br>
[Forensics](/CTF/Forensics)<br>
[Cryptography](/CTF/Cryptography)<br>
[Web Exploitation](/CTF/Web_Exploitation)<br>
[Reverse Engineering](/CTF/Reverse_Engineering)<br>
[Binary Exploitation](/CTF/Binary_Exploitation)<br>
When you get to be very competitive it is recommended that you specialize in a single topic and the rest of the members of your team do the same. Obviously, everyone chooses a different topic. This doesn't mean that you only have to know about that single topic, it just means that you should have the most knowledge when it comes to solving those particular problems. You and the rest of your team should meet on a regular basis sharing new information that you found and teaching everyone at least the basics of your topic. There will come times where you will get stuck and if you are the only one that knows anything about that subject then how are your teammates going to be able to help you. You might be thinking right now, "well if I, the master of web exploitation, get stuck on a problem then how then are my teammates going to be able to help me? I know way more than them.". I have many answers to this one. You didn't get enough sleep the night before so you brain is a little foggy so you just need your teammate to remind you of a tip or trick you showed them in a previous meeting that wasn't on your mind at the moment. It might be you first competition and your so nervous that you just feel like you forgot everything, bouncing around ideas with your teammates can help you remember what it was that you just briefly forgot. <br>
When it comes to learning and practicing for these, offense and defense are mission sets and then there are skill sets which get brought up in CTFs and Jeopardy. Those skill sets can be applied to both defense and offense. So mainly, when studying for CTFs don't think that the skills you are learning can only be used for CTFs and nothing else.

View File

@@ -2,6 +2,13 @@
Every week someone from the competition team will look into a tool used for solving CTF challenges. A breif presentation will be given about the tool and a write up consisting of only a few sentences will be presented as well. Here you can find the tools that we have discussed and the write up provided by the individual who did researched said tool. Every week someone from the competition team will look into a tool used for solving CTF challenges. A breif presentation will be given about the tool and a write up consisting of only a few sentences will be presented as well. Here you can find the tools that we have discussed and the write up provided by the individual who did researched said tool.
# TOTW # TOTW
Meeting on 2/4/21<br>
<b>Python</b> <br>
Waiting on inspectElement to fill this out. <br>
<b>inspectElement</b>
----
Meeting on 1/28/21 <br> Meeting on 1/28/21 <br>
<b>Nmap</b> <br> <b>Nmap</b> <br>
"Using the command ifconfig you can get the rage of your network and once you do that you can then use Nmap to discover other machines. If there is a target machine in the network range, you can use Nmap to discover the machines IP address. Similar tools include netdiscover and ARP. Using these two tools first can allow you to narrow down the target machine and you can then use Nmap along with these two commands to get the information you need about the target machine. The command sS will tell Nmap to look for open ports and services and the command AT4 looks for OS information, which can tell you a lot about your target machine." <br> "Using the command ifconfig you can get the rage of your network and once you do that you can then use Nmap to discover other machines. If there is a target machine in the network range, you can use Nmap to discover the machines IP address. Similar tools include netdiscover and ARP. Using these two tools first can allow you to narrow down the target machine and you can then use Nmap along with these two commands to get the information you need about the target machine. The command sS will tell Nmap to look for open ports and services and the command AT4 looks for OS information, which can tell you a lot about your target machine." <br>

View File

@@ -0,0 +1,71 @@
## Kali Linux
Once you have VirtualBox downloaded it is time to download Kali Linux. There are two options to choose from. The "customized" one is created by zSecurity. I took a course that he taught and it was great. It works very well but the other Kali machine has a ton of pre-installed tools. Either OVA file will work. They are both great! If you are interested in knowing what bugs he fixed, here is the link to it:<br>
[Kali Linux by Zsecurity](https://zsecurity.org/download-custom-kali/)<br>
## Links to both downloads
Link to the regular Kali Linux 2020 Machine:<br>
[Kali Machine](https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox-image-download/#1572305786534-030ce714-cc3b) <br>
Link to the zSecurity Kali Linux machine: <br>
[zSecurity Machine](https://zsecurity.org/download-custom-kali/) <br>
<br>
## kali-linux-2020
The default user has been changed to a standard, unprivileged user. The default username and password are both "kali".<br>
Prevent Kali from going idle:
- Click on the power button (top right), then "Power Manager Settings", and then Display
- Change all of them to "never"
- Go to security, change the same thing, if you want to.
To change the password:
- sudo su (su meaning switch user)
- Type in the password ("kali")
- passwd root (we are changing the password for the root user, you.)
- type in your new password
Now it is time to update. You will need to be patient for this step. Open up a terminal and type in the following:
```unix
$ apt update && apt -y full-upgrade
```
After all of that you should be set. When powering down the machine do not use the x button in the corner. Doing that is like pulling the plug on your computer when it is on. You are going to go to VirtualBox, right click on the machine, then close, then power off.<br>
<br>
## Kali 2020 x64 Customized by zSecurity
After downloading and then double clicking on the OVA file, click on import. If you haven't downloaded Oracle VM extension pack, go ahead and do so now. I explain where it is one directory up. If you have everything downloaded we can now turn on the machine. If you would like to change the name of the machine I would do so now. Click on the machine, then settings, and then in general is where you can change the name. After you do that, hit start.<br>
The log in information is going to be:<br>
username: "root"<br>
password: "toor"<br>
Prevent Kali from going idle:
- Click on the power button (top right), then "Power", and then switch it to never.
The next thing you want to do is update the sources where Kali can search and download programs from with the following command:
```unix
# apt-get update
```
If you would like to you can install a terminal that will allow you to have multiple terminal windows open in the same window. You are going to download this with the following command.
```unix
# apt-get install terminator
```
Press y and hit enter to confirm the download and then it will install on your system. <br>
<br>
## Windows won't let you power on Kali Linux?
If you are using Windows then you might come across an error in which the machine won't even start. Does it say something like "Failed to open a session for the virtual machine"? If so, try the following and see if it fixes the issue. If it doesn't fix the issue then you can always message in the general slack and ask for help!<br>
What you are going to want to do is first close out your virtual machine manager, in this case it should be VirtualBox. Go to Windows Search and type in "features". Click on "Turn Windows features on or off". Now you are going to disable the following. If any of them are already disabled, then you can skip those:
- Virtual Machine Platform
- Windows Defender Application Guard
- Windows Hypervisor Platform
- Windows Sandbox
Click ok and restart your computer.

View File

@@ -0,0 +1,2 @@
for now, donwload OVA file under Parrot Security OVA, double click to import it into virtual box. Start it, wait a few minutes, a pop up will ask if you want to update. Update, this will take a while. Take a snapshot of the machine in Virtual Box. Then go crazy! <br>
[Parrot OS](https://www.parrotsec.org/download/)

View File

@@ -0,0 +1,19 @@
# Virtual Machines
Here are a few virtual machines along with instructions on how to download them. <br>
If you are unfamiliar with what virtualbox, Linux, and Kali Linux are, then head on over to the "where to start" directory where I have added some great links to videos and readings on those topics. I'll even give you a link right to it, here: [Let's Learn](/0_Where_To_Start) <br>
<br>
## Before you get started
Before you get started, I recommend downloading a download manager. It is not necessary but can be helpful. You can download a popular and free one called [Free Download Manager](https://www.freedownloadmanager.org/). I mean, that name could not be better. If you ever google "hey I want a free download manger", boom that's the first thing that is going to pop up. If you're not sure why you should get it maybe this article will help. <br>
[Why You Should use a Download Manager](https://www.hellotech.com/blog/use-download-managers)<br>
I also recommend you create a folder in your home directory called VirtualBox images and store all of these images that you are downloading in there. You can also create folders for each of the machines within VirtualBox images. The two Kali machines and the Parrot OS machine can go in a folder called OVA files. The SEEDLabs Ubuntu machines can go in a folder called VMDK files and the iso image can go in a folder called ISO Images. Stay organized, it only makes life easier! <br>
<br>
## Virtualbox
If you don't already have virtualbox then go ahead and download it. We all use it so if you have any trouble with it don't be afraid to ask for help! I reccomend also downloading the extension pack after your installation for virtual box has finished. You will find it right under the download you just clicked on. It will be called "Oracle VM VirtualBox Extension Pack". Download it and then double-click it. It will open virtual box and then just hit install. <br>
[VirtualBox](https://www.virtualbox.org/) <br>
With whatever virtual machine you decide to download, after running the instructed update and upgrade commands make sure you take a snapshot! Doing so will save the state of the machine. You will title it "fresh install" and for the description you will put something along the lines of "Just installed this vm and ran the instructed update commands". Now if anything happens to your machine you can always restore this snapshot and run it like you just installed it. It is recommended that you create snapshots before doing anything big. I will always take a snapshot after downloading certain tools because some of them can be a pain to downlaod and install.
<br>

View File

@@ -0,0 +1,2 @@
Downlaod the digital ocean download for the 12.04 machine and read the pdf for instructions. <br>
[Ubuntu 12.04](https://seedsecuritylabs.org/labsetup.html)

View File

@@ -0,0 +1,2 @@
Downlaod the digital ocean download for the 16.04 machine and read the pdf for instructions. <br>
[Ubuntu 16.04](https://seedsecuritylabs.org/labsetup.html)

View File

@@ -0,0 +1,10 @@
## From SEEDLabs
Downlaod the digital ocean download for the 20.04 machine and click the link below for instructions. <br>
[Ubuntu 20.04](https://seedsecuritylabs.org/labsetup.html) <br>
[Instructions](https://github.com/seed-labs/seed-labs/blob/master/manuals/vm/seedvm-manual.md)
## ISO image
Go to this link in which you will be prompted to download an iso file. Create a folder in your home directory for virtual box images and create a folder inside of that one called ISO images. If you are interested in getting this machine up and running in virtual box then message me and ask for help, if you even need it. <br>
[Ubuntu 20.04 download](https://ubuntu.com/download/desktop/thank-you?version=20.04.2&architecture=amd64)