KringleCon 2020

Ditto
Dec 19, 2020

--

First CTF completed!

These are my main learnings:

Forensics:

  1. Photo editing (Objective 1)
  2. Unpacking file (Objective 2)
  3. Electron App decompiling (Objective 3)
  4. Splunk (learning about OSTAP atomic tests

Cloud:

  1. Unsecure bucket (Objective 2) )

Hardware:

  1. Proxmark ID spoofing? (Objective 5)
  2. Debugging CAN Bus logs

Software tools:

  1. Scapy (DNS/ARP packet spoofing (Objective 9) )
  2. Javascript (ElfCode challenge and Objective 10)
  3. Predicting random values with Mersenne-twister-predictor (Objective 11)
  4. MD5 collision (Objective 11)

Thanks SANs and team for the great challenge, write-ups will be posted after 4 Jan when the challenge retires!

Next up, preparing for AWAE!!

--

--

No responses yet