First CTF completed!
These are my main learnings:
Forensics:
- Photo editing (Objective 1)
- Unpacking file (Objective 2)
- Electron App decompiling (Objective 3)
- Splunk (learning about OSTAP atomic tests
Cloud:
- Unsecure bucket (Objective 2) )
Hardware:
- Proxmark ID spoofing? (Objective 5)
- Debugging CAN Bus logs
Software tools:
- Scapy (DNS/ARP packet spoofing (Objective 9) )
- Javascript (ElfCode challenge and Objective 10)
- Predicting random values with Mersenne-twister-predictor (Objective 11)
- MD5 collision (Objective 11)
Thanks SANs and team for the great challenge, write-ups will be posted after 4 Jan when the challenge retires!
Next up, preparing for AWAE!!