Wizards of Dos ist the CTF Team of this Hackspaces.
Join the IRC #wizardsofdos @ irc.hackint.org
For communication and coordination during a CTF we mostly use Mattermost
We also have a CTFPad instance which is hosted at pads.ctf.darmstadt.ccc.de
Not sure where to start learning and training?
CTF challenges are commonly seperated into different categories. Below, we explain some categories and provide learning materials for them. If you don't know which category you prefer or are new to all of this read the Beginner category.
The following have no specific order, pick whatever interests you most first and switch as you prefer.
Knowing how to navigate a Linux system is an important skill in general. This wargame will teach you some concepts typically encountered on a Linux system and the general mindset for wargames and CTFs.
Pico CTF is a CTF designed for high school and early college Students and covers the typical CTF categories.
In the Binary category you are given some kind of executable program that is already compiled and have to reverse engineer or exploit it. Reverse engineering means understanding what the program does and finding some input which generates the flag. Exploiting means finding some flaw in the program that allows you to take control over the process and get a shell on the system where you then often just read a file 'flag' or 'flag.txt' that contains the flag
In the Crypto category, you need to attack cryptographic operations, e.g. decrypt a ciphertext without knowing the key or generating a signature for a certain input. Sometimes, this includes "classical" codes like Vigenere cipher, but the more interesting challenges are based on modern crypto systems.
The higher rated crypto challenges commonly require you to read papers about attacks on some crypto system and implementing these attacks. As cryptographic primitives are often based on mathematical problems, a solid understanding of mathematics helps, too.
Web Application for playing around with Web exploitation https://www.owasp.org/index.php/OWASP_Juice_Shop_Project
Web Security Basics (XSS and CSRF)
Bearbeitet werden kann der Inhalt über unser doku Repository im GitLab.
:::info Die w17 ist aktuell aufgrund der aktuellen Lage des COVID-19 Virus geschlossen. Als digitale Alternative gibt es einen mumble Server: mumble.hax404.de. :::