This one requires you to use the webshell. Remember, when using the webshell, you will need your Pico username and password. Use the Netcat command (nc) given to you in…
Category: CTF
Capture The Flag and Other Security Competitions
pico crackme.py
The crackme.py challenge under Reverse Engineering looks more difficult that it really is. Download the crackme.py code and look over the code. It actually tells you what to use to…
pico Mod26
They give a very good hint here. You can easily find how to solve this one using an obvious web tool.
How to completely secure an Ubuntu server
https://dev.to/alejandroakbal/how-to-completely-secure-an-ubuntu-server-55i2
Cyber Security: Protecting Your Data in a Dangerous Situation
Once upon a time, a student left their laptop unattended and put themself in a dangerous situation. When the student returned to her laptop, she noticed that it appeared that…
Penetration Testing — 100 Terms You Need To Know | by Manish Shivanandhan | Manish Shivanandhan’s Blog | Sep, 2020 | Medium
https://medium.com/manishmshiva/penetration-testing-100-terms-you-need-to-know-a723c38cd8c8
Hacker Name Generators
If you need help coming up with your “hacker” name, try one of these … https://www.fantasynamegenerators.com/hacker-names.php https://codepen.io/robrehrig/full/XbvGMJ https://nickfinder.com/mix-two-names Make sure you do not use inappropriate words / names for class.
CyberPatriot Answer Form
We will use this form to submit our CyberPatriot Solutions and Penalties for future competitions.
CyberPatriot CPXIII Schedule
This is the tentative CPXIII Competition Schedule. https://www.uscyberpatriot.org/competition/current-competition/competition-schedule