Update README.md
This commit is contained in:
committed by
GitHub
parent
6fc6581ea9
commit
9931e46752
@@ -5,18 +5,18 @@ Every week someone from the competition team will look into a tool used for solv
|
||||
Meeting on 2/11/21<br>
|
||||
[Snort](https://www.snort.org/) <br>
|
||||
"Snort is an open source intrusion prevention system. It is capable of real-time traffic analysis and packet logging. You can easily read through the logs and you can also have the logs fowarded to the logging system of your choice such as splunk; CCDC members will probably be familiar with that name. I also propose that whoever manages splunk should be gifted the incredible nickname that I thought of, Spunk Master Flex; named after Funk Master Flex." <br>
|
||||
<b>percyKnox</b>
|
||||
<b>Percy Knox</b>
|
||||
|
||||
----
|
||||
|
||||
Meeting on 2/4/21<br>
|
||||
<b>Python</b> <br>
|
||||
"When it comes to solving capture the flag challenges there are many great tools that you can use, some of which might already be downloaded on your pentesting machine! If not, you can find many great tools to download online. However, there are going to be times where the tools that you have at your disposal are almost what you need but not exactly what you need. If you ever get to this point, you should never give up. You just need to find another way to solve the problem and Python just might be your answer. Python is great for writing scripts quickly and effeciently. With Python, you can do almost anything. You can use Python to create scripts to solve an array of problems including password cracking, web exploitation, and many more." <br>
|
||||
<b>inspectElement</b>
|
||||
<b>inspectelement</b>
|
||||
|
||||
----
|
||||
|
||||
Meeting on 1/28/21 <br>
|
||||
<b>Nmap</b> <br>
|
||||
"Using the command ifconfig you can get the rage of your network and once you do that you can then use Nmap to discover other machines. If there is a target machine in the network range, you can use Nmap to discover the machine’s IP address. Similar tools include netdiscover and ARP. Using these two tools first can allow you to narrow down the target machine and you can then use Nmap along with these two commands to get the information you need about the target machine. The command –sS will tell Nmap to look for open ports and services and the command –AT4 looks for OS information, which can tell you a lot about your target machine." <br>
|
||||
<b>percyKnox</b>
|
||||
<b>Percy Knox</b>
|
||||
|
||||
Reference in New Issue
Block a user