RedHat List of Common Communication Ports

Here is an extensive list of the most common communication ports. https://web.mit.edu/rhel-doc/4/RH-DOCS/rhel-sg-en-4/ch-ports.html

Google announces a $10,000 bounty CTF event for Kubernetes

Google has recently announced a CTF style bounty program to test its Kubernetes Engine with a payout up to $10,000. Read More…

National Cyber League partners with COMPTIA for CTF competitions

The National Cyber League and COMPTIA are partnering for the upcoming season of CTF competitions. Read More

PicoCTF Cyber Security Competition

Each year, Lincoln students compete with other students from across the country in Carnegie Mellon University’s picoCTF cyber security competition.

Binary Exploitation – Practice Run 1

You will need the Linux Shell for this. You also will need to know how to use the CD command to change directories and the ./ option to execute the…

Forensics – Garden

A good stegnography file analyzer will help. https://www.secsy.net/easy_stegoCTF

Cryptography – Tapping

Hmmm. Not sure if this code is still used. Some may know this code from either sounds or light flashes.

like1000

This is a compressed file. Unfortunately, you cannot use the extract function of Windows to uncompress this like you would to a “zipped” file. Perhaps something like 7zip might work…

Forensics – Shark on a Wire

The seems to be a play on words for Wireshark. Perhaps there is such a tool on your computers.

Reverse Engineering – Vault Door Training

One big security risk is having passwords readily available in the source code of apps.