A toolkit collection for CTF challenges
Each security domain has its own folder containing:
- a reference README.MD
- any files/scripts we deemed useful
we strongly suggest using the kali distribution https://www.kali.org/
For windows follow these steps:
- install VMware Workstation Player
- pick up an existing Kali image for VMWare, for example through offensive-security.com
- create a VM using the provided image
- configure the correct os type (debian) for the VM through settings > advanced
- connect with default kali credentials, remember to watch for qwerty keyboards
- install and configure the vmware tools on the running image (this enables fullscreen, copy/paste and other good stuff)
- copy the cd media to any folder with read/write perms
- unpack the vmwaretool archive
- execute the perl script in the unpacked archive and leave most options to default CAREFUL: you may want to think twice about sharing files & network with the host machine for malware CTF challenges
- stop the running VM and enable hardware acceleration through the VM settings' menu
- enjoy and go fetch some flags (and remember to change the default password)!
For linux well ... you know what to do :) !