Here is an extensive list of the most common communication ports. https://web.mit.edu/rhel-doc/4/RH-DOCS/rhel-sg-en-4/ch-ports.html
Tag: #ctf
Google announces a $10,000 bounty CTF event for Kubernetes
Google has recently announced a CTF style bounty program to test its Kubernetes Engine with a payout up to $10,000. Read More…
National Cyber League partners with COMPTIA for CTF competitions
The National Cyber League and COMPTIA are partnering for the upcoming season of CTF competitions. Read More
PicoCTF Cyber Security Competition
Each year, Lincoln students compete with other students from across the country in Carnegie Mellon University’s picoCTF cyber security competition.
Binary Exploitation – Practice Run 1
You will need the Linux Shell for this. You also will need to know how to use the CD command to change directories and the ./ option to execute the…
Forensics – Garden
A good stegnography file analyzer will help. https://www.secsy.net/easy_stegoCTF
Cryptography – Tapping
Hmmm. Not sure if this code is still used. Some may know this code from either sounds or light flashes.
like1000
This is a compressed file. Unfortunately, you cannot use the extract function of Windows to uncompress this like you would to a “zipped” file. Perhaps something like 7zip might work…
Forensics – Shark on a Wire
The seems to be a play on words for Wireshark. Perhaps there is such a tool on your computers.
Reverse Engineering – Vault Door Training
One big security risk is having passwords readily available in the source code of apps.