Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Geeky Camp: Security

Geeky Camp: Security

Marin Shalamanov

February 20, 2016
Tweet

More Decks by Marin Shalamanov

Other Decks in Programming

Transcript

  1. Tor Browser By Electronic Frontier Foundation, minor modifications by me.

    - https://www.torproject.org/about/overview.html.en, CC BY 3.0,https://commons.wikimedia.org/w/index.php?curid=17887560
  2. Kali Linux Information Gathering Vulnerability Analysis Wireless Attacks Web App

    Exploit Exploit Tools Forensics Tools Stress testing Sniffing && Spoofing Password Attacks Reverse Engineering Hardware Hacking
  3. Web

  4. Dehashing? Lorem ipsum dollor sit amet MD5 MD5 MD5 MD5

    MD5 db6ff2ffe2df7b8cfc0d9542bdce27dc e78f5438b48b39bcbdea61b73679449d c1de6c3a9013b4e41854a091ff93a4f2 87d4eeb7dec7686410748d174c0e0a11 7f9a983a540e00931a69382161bdd265 “Lorem” “ipsum” “dollor” “sit” “amet” HashMap
  5. 1. IDA Decompiler https://www.hex-rays.com/products/decompiler/ 2. CTF Time https://ctftime.org/ 3. CTF

    Field Guide http://trailofbits.github.io/ctf/ 4. Kali Linux https://www.kali.org/ 5. Wireshark https://www.wireshark.org/ 6. OWASP https://www.owasp.org/ 7. Tor Project https://www.torproject.org/ 8. Decompile Android http://decompileandroid.com/ 9. NameChek https://namechk.com 10. Writeups for CSAW CTF 2012 https://ctf.isis.poly.edu/static/archives/2012/writeups/index.html Resources