Common Tools and Methods Used in Vulnhub CTF's
Common Tools and Methods Used in Vulnhub CTF's
--------------------------------------------------------------------------------
Some spoilers in the myst...
never forget to check sudo -l on a system for interesting info on what you can
run (if configured) as root
ex:
root@kali:~/# echo foo | base64
Zm9vCg==
root@kali:~/# echo Zm9vCg== | base64 -d
foo
root@kali:~/#
sparta - scan network, also good reporting tool for saving logged info, various
gui controls, self explanatory
usage: sparta
(opens gui, add host, have at it)
objdump - get various binary info help. Used to debug info for non running
programs ex:
root@kali:~/necromancer# objdump -f talisman
On an amd64 machine, the above binary will not run without i386 utils.
In kali 2.0 2016.1 rolling, install "lib32z1"
(lib32z1 replaces ia32-libs)
apt-get install lib32z1
now you can run the elf32-i386 program in amd64 :)
gdb talisman
info functions
Non-debugging symbols:
0x080482d0 _init
0x08048310 printf@plt
0x08048320 __libc_start_main@plt
0x08048330 __isoc99_scanf@plt
0x08048350 _start
0x08048380 __x86.get_pc_thunk.bx
0x08048390 deregister_tm_clones
0x080483c0 register_tm_clones
0x08048400 __do_global_dtors_aux
0x08048420 frame_dummy
0x0804844b unhide
0x0804849d hide
0x080484f4 myPrintf
0x08048529 wearTalisman
0x08048a13 main
0x08048a37 chantToBreakSpell
0x08049530 __libc_csu_init
0x08049590 __libc_csu_fini
0x08049594 _fini
ex:
binwalk -B file
(show file info)
binwalk -e file
(extract compressed archives from target - try images! ie: jpg)
--------------------------------------------------------------------------------
WARNING - Disclaimer - gobuster, cewl and dirbuster, may cause IDS or
mod_security types to ban you! You may no longer be able to visit a
target after crushing them with requests! Do on targets you own!
staap pointing yoru laser at the www.
--------------------------------------------------------------------------------
gobuster - similar to dirbuster, but dead simple and fast cmdline util
ex:
gobuster -e -w wordlist.txt -u site.com -s [responsecode] -a "UserAgent"
where response code is valid http return codes such as 200, 301, 302,
404, 403, etc. -x lets you choose a file extension to append to words
See gobuster -h for lots more it can do!
cewl - digininjas wordlist helper. Before using gobuster, having good subject
matter for words related to your target is crucial. ex:
cewl -m 4 -d 0 -w wordlist.txt --ua "User Agent - They are important" target
-d is the depth to spider on the site. For large sites, this can run a
long time with a larger depth. If all you want is a single page,
go 0 for the main site page. -m is the min word length to save.
gobuster and dirbuster can take these and add file extennions as well!
dirbuster - follows wordlist to brute force directories. run the gui to see
wireshark | tshark - wireshark GUI packet sniffer, tshark cmdline packet sniffer
This is by no means a complete list. Feel free to update and add to. Give me a
shout on twitter @xxDigiPxx