background preloader

OverTheWire: Wargames

OverTheWire: Wargames
We're hackers, and we are good-looking. We are the 1%. The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games. To find out more about a certain wargame, just visit its page linked from the menu on the left. If you have a problem, a question or a suggestion, you can join us on IRC. Suggested order to play the games in Bandit Leviathan or Natas or Krypton Narnia Behemoth Utumno Maze … Each shell game has its own SSH port Information about how to connect to each game using SSH, is provided in the top left corner of the page.

http://overthewire.org/wargames/

Related:  TutoGamingChallenges

Embedded Security CTF Scattered throughout the world in locked warehouses are briefcases filled with Cy Yombinator bearer bonds that could be worth billions comma billions of dollars. You will help steal the briefcases. Cy Yombinator has cleverly protected the warehouses with Lockitall electronic lock devices. Lockitall locks are unlockable with an app. We've positioned operatives near each warehouse; each is waiting for you to successfully unlock the warehouse by tricking out the locks. The Lockitall devices work by accepting Bluetooth connections from the Lockitall LockIT Pro app.

Wargames - HES2010 We're hackers, and we are good-looking. We are the 1%. This wargame was introduced at the Hackito Ergo Sum (HES) 2010 conference in Paris and is centered around the fictitious company dirty-underwear.com install_aircrack Requirements Linux Kernel headers and gcc as well as make have to be installed on your system. On Debian-based distros (Debian, Ubuntu, Xubuntu, …), issue the following command in a console to install them: sudo apt-get install build-essential Polygonal Map Generation for Games I wanted to generate interesting game maps that weren’t constrained to be realistic, and I wanted to try some techniques I hadn’t tried before. I usually make tile maps but instead used a different structure. What could I do with 1,000 polygons instead of 1,000,000 tiles?

Buffer Overflow This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page. This article includes content generously donated to OWASP by 20 things to do after installing Kali Linux - blackMORE Ops 20 things to do after installing Kali Linux I’ve compiled a small list of things that I always perform after installing a fresh copy of Kali Linux in this post. Because I got multiple laptops and workstations, I’ve tried to generalize the following instructions to suit everyone’s(including mine??)

How to Design A Wilderness with Mind Maps Mind maps are diagrams used to represent words, ideas, tasks, or other items linked to and arranged around a central key word or idea. When using a mind map to design a wilderness, the various locations are arranged as separate ideas and connections are drawn between these locations to represent physical pathways. Designing a wilderness as a mind map is an organizational technique for game masters. Testing for Cross site scripting [Up]OWASP Testing Guide v2 Table of Contents Overview Related Security Activities Description of Cross-site scripting Vulnerabilities Analysis of Buffer Overflow Attacks What causes the buffer overflow condition? Broadly speaking, buffer overflow occurs anytime the program writes more information into the buffer than the space it has allocated in the memory. This allows an attacker to overwrite data that controls the program execution path and hijack the control of the program to execute the attacker’s code instead the process code. For those who are curious to see how this works, we will now attempt to examine in more detail the mechanism of this attack and also to outline certain preventive measures. From experience we know that many have heard about these attacks, but few really understand the mechanics of them. Others have a vague idea or none at all of what an overflow buffer attack is.

Armitage Tutorial - Cyber Attack Management for Metasploit About ArmitageBefore we begin... Getting StartedHow to get any woman to talk to you User Interface TourSo many pretty screenshots Host ManagementYou've got to find them to hack them. ExploitationThis is the fun stuff Post-ExploitationThis is the really fun stuff ManeuverGetting around the network and on to more targets Team MetasploitThis is cyber attack management! Scripting ArmitageThe next step...

Cascading Dice: A House Rule for Tracking Ammunition The Green Arrow's got nothing on Team Intwsicha Arrows, O how I hate counting thee! Whether the game is B/X D&D, Shadowrun, or 4th Edition D&D, players have for years forgotten to keep good track of mundane consumables like food and arrows.

Related:  Challenges / Wargames