NKCyber Club Resources
Table of Contents
- Intro
- Cyber Security Resources
- General Roadmap
- CTFs and Wargames
- Other CTFs
/(Over|Under)TheWire/
- Cross Site Scripting (XSS)
- Virtual Machines available for download:
- Public hacking wikis
- Lists of resources
- YouTube CyberSecurity
- LiveOverflow
- LiveOverflow Recommends
- OSINT Hotspots
- RISCV assembly hacking boardgame
- C pointer board game
- Living off the land
- OWASP resources
- More vulnerable virtual macines:
- JWT Security
- Metasploit and Metasploitable
- OWASP resources
- DSVW Docker Container
- Cryptography
- Downfall.page
- Social Engineer Toolkit
- Introductory Resources
- Random Number Manipulation
- Hosting CTFd with challenge VMs and virtualization:
- Create Randomly Insecure Virtual Machines
- Windows Privilege Escalation Workshop with MetaSploit
- Binary Exploitation Resources
- DreamHack (EN+KR)
- Oldest site I’ve found
- Steganography
- How to integrate Flipper Zero?
- CTFd
- Netris
- Github Hacking List
Intro
Hi! I’m Zack Sargent. I’m in charge of running weekly meetings for my university’s cyber security and hacking club, NKCyber.
During my time finding things to do for our meetings, I’ve stumbled across quite a few resources.
Here is the list that I personally reference when looking for inspiration. If you think it could be better, feel free to let me know!
Cyber Security Resources
General Roadmap
It can be difficult to learn when you don’t know what you don’t know. Roadmap.sh is great at turning unknown unknowns into known unknowns.
https://roadmap.sh/cyber-security
Step by step guide to becoming a Cyber Security Expert in 2024
CTFs and Wargames
Upcoming CTFs
Capture The Flags are a super valuable way to learn about hacking and cybersecurity. Check CTFTime to see when they are being hosted:
Hack The Box
The #1 cybersecurity upskilling platform. Hack The Box gives individuals, businesses and universities the tools they need to continuously improve their cybersecurity capabilities — all in one place.
- Hack The Box https://www.hackthebox.com/
- Hack The Box - Universities - https://www.hackthebox.com/universities
Try Hack Me
Anyone can learn cyber security with TryHackMe Hands-on cyber security training through real-world scenarios.
TryHackMe has great free and paid material.
- Try Hack Me Activities https://tryhackme.com/hacktivities
- Try Hack Me Classrooms https://tryhackme.com/classrooms
- 350+ Free rooms
- $20/user -> a bit pricey for hosting, but pretty good material
Other CTFs
CrackMes.one https://crackmes.one/ Free. Great for binary exploitation, and not much else. Good if we do a lesson on Ghidra.
PicoCTF https://picoctf.org/ -> Good, free ctf
- https://primer.picoctf.org/ -> Primer, become a hacker from nothing
VulnHub https://www.vulnhub.com/ A collection of vulnerable virtual machines
Ring0CTF https://ringzer0ctf.com/ “Jeopardy” style ctf
-
https://archive.ooo/ - Playable archive of DEFCON capture the flag events from 2018 to 2021.
- See also: https://oooverflow.io/ and https://github.com/o-o-overflow
https://sizeof.cat/links/#pentesting-sites recommends:
/(Over|Under)TheWire/
OverTheWire is for Linux & Bash -> https://overthewire.org/wargames/
UnderTheWire is for Powershell -> https://underthewire.tech/wargames
Cross Site Scripting (XSS)
Both of these sites are useful for practicing XSS in a gamified format:
And, a reminder of why alert(1)
may not be as useful as
alert(document.domain)
or
alert(window.origin)
:
General XSS theory and resources:
- https://primer.picoctf.org/#_cross_site_scripting_xss
- https://www.thehacker.recipes/web/inputs/xss
- https://book.hacktricks.xyz/pentesting-web/xss-cross-site-scripting
XSS resources recommended by thehacker.recipes:
- https://xss-game.appspot.com/
- https://excess-xss.com/
- https://owasp.org/www-community/attacks/DOM_Based_XSS
- https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XSS%20Injection
Virtual Machines available for download:
- Phoenix
- Nebula
- Fusion
- Main Sequence
- Protostar
exploit.education provides a variety of resources that can be used to learn about vulnerability analysis, exploit development, software debugging, binary analysis, and general cyber security issues.
Public hacking wikis
Here are some wikis all about cybersecurity. These are great resources to link people to, because there’s no ads.
- Hacker Recipies: https://www.thehacker.recipes/
- SQL Injection: https://www.thehacker.recipes/web/inputs/sqli
- Network Access Control: https://www.thehacker.recipes/physical/networking/network-access-control
- https://www.ired.team/
- https://book.hacktricks.xyz/
- https://redteam.wiki/
- https://es7evam.gitbook.io/security-studies
- https://ir0nstone.gitbook.io/notes
Lists of resources
Not enough ideas for you? Check out these lists!
- Awesome CTF github repo (jump to wargames list)
- https://github.com/CSIRT-MU/edu-resources <- this is a pretty good assortment of resources
See the Awesome CTF list of wargames
Wargames
Always online CTFs
- 247ctf - A learning oriented real CTF platform with challenges covering across web, cryptography, networking, reversing and exploitation.
- Backdoor - Security Platform by SDSLabs.
- buuoj - A CTF training platform with challenges collected from the past real CTF contests around the world. (in Chinese)
- Crackmes - Reverse Engineering Challenges.
- CryptoHack - Fun cryptography challenges.
- echoCTF.RED - Online CTF with a variety of targets to attack.
- Exploit Exercises - Variety of VMs to learn variety of computer security issues.
- Exploit.Education - Variety of VMs to learn variety of computer security issues.
- Gracker - Binary challenges having a slow learning curve, and write-ups for each level.
- Hack The Box - Weekly CTFs for all types of security enthusiasts.
- Hack This Site - Training ground for hackers.
- Hacker101 - CTF from HackerOne
- Hacking-Lab - Ethical hacking, computer network and security challenge platform.
- Hone Your Ninja Skills - Web challenges starting from basic ones.
- IO - Wargame for binary challenges.
- jarvisoj - A CTF training platform developed by Jarvis from USSLab in ZJU.
- Microcorruption - Embedded security CTF.
- Over The Wire - Wargame maintained by OvertheWire Community.
- PentesterLab - Variety of VM and online challenges (paid).
- PicoCTF - All year round ctf game. Questions from the yearly picoCTF competition.
- PWN Challenge - Binary Exploitation Wargame.
- Pwnable.kr - Pwn Game.
- Pwnable.tw - Binary wargame.
- Pwnable.xyz - Binary Exploitation Wargame.
- Reversin.kr - Reversing challenge.
- Ringzer0Team - Ringzer0 Team Online CTF.
- Root-Me - Hacking and Information Security learning platform.
- ROP Wargames - ROP Wargames.
- SANS HHC - Challenges with a holiday theme released annually and maintained by SANS.
- SmashTheStack - A variety of wargames maintained by the SmashTheStack Community.
- Viblo CTF - Various amazing CTF challenges, in many different categories. Has both Practice mode and Contest mode.
- VulnHub - VM-based for practical in digital security, computer application & network administration.
- W3Challs - A penetration testing training platform, which offers various computer challenges, in various categories.
- WebHacking - Hacking challenges for web.
Self-hosted CTFs
- CTFTraining - CTF challenge’s source code, writeup collected from the past real CTF contests around the world. (in Chinese)
- My CTF Web Challenges - CTF challenge’s source code, writeup and some idea explanation. All about Web.
- Pikachu - PHP web application with some common delibrated vulnerabilities. (in Chinese)
See the CSIRT-MU list
Cybersecurity Educational Resources
This is an awesome list of resources related to teaching cybersecurity, primarly to running Capture the Flag games for educational purposes. The resources are divided into categories and sorted alphabetically within each category.
Capture the Flag (CTF) games
- CTFd – an open-source CTF platform
- CTFtime – a public directory of all CTFs organized currently or in the past
- CTF Field Guide – an online book about preparing for CTFs
Online training grounds and practice challenges
- Avatao – challenges to practice cybersecurity skills
- Crackmes.One – challenges to practice reverse engineering
- Damn Vulnerable Web Application (DVWA) – a PHP/MySQL web application containing various vulnerabilities
- Exploit Exercises – virtual machines and challenges to practice security exploits
- Hack Me – a community platform for building, hosting and sharing vulnerable web app code
- Hack The Box – a community platform with hacking challenges
- Hack This Site – training ground for hackers including a community forum
- Hack This!! – challenges to practice cryptography, forensics, JavaScript, SQL, and more
- Hacker Test – challenges to practice JavaScript, PHP, HTML and graphic thinking
- Root Me – challenges to practice hacking skills
- Secure Code Warrior – security learning resources and challenges
- Wargames – games for practicing hacking skills
Online courses and materials
- Cybrary – free online security courses
- Cyber Security Degrees – lists of scholarships, degree programs, and certifications in the USA
- eLearnSecurity – paid online security courses
- ENISA Training Resources – educational resources
- Exploit Database – archive of exploits
- Hacker101 – free, open-source video lessons on web security
- Hacksplaining – vulnerabilities explained simply
- Open Security Training – free, open-source materials for computer security classes
- PortSwigger – free, online web security training with basic and advanced topics and hands-on labs
- SANS – professional paid information security training
- SANS Cyber Aces – video tutorials with handouts and quizzes
- Teaching Security – ready-made materials for classrooms
Other interesting lists
- Awesome Security List – a major list on everything security-related
- Penetration Testing Practice Lab – a roadmap for vulnerable apps and systems
- Practice CTF List – CTF practice sites and tools
- TeachCyber – a list of free online resources
- WeChall – a list of web challenges and practice sites
Do you want to contribute or share your comments?
We highly appreciate new contributions, suggestions for improvement, or any other comments. Please email Valdemar Švábenský at valdemar@mail.muni.cz.
Authors
This list was compiled and is maintained by the members of the CSIRT-MU team at the Masaryk University.
Licence
This work is licensed under a CC0 (Public Domain) License. Feel free to use it in any way.
YouTube CyberSecurity
These are my personal recommendations.
Related:
- Ben Eater - https://eater.net/ - Hardware
- PirateSoftware - Hacker, turned GameDev YouTuber
- Which is your favourite cybersecurity youtube channel? And why?
LiveOverflow
I really like the hacking educator LiveOverflow.
I totally recommend going to his website and searching for a hacking topic you’re interested in.
SUDO Vulnerability
Sudo Vulnerability Walkthrough (3 hours, 22 minutes, 27 seconds)
LiveOverflow Recommends
LiveOverflow recommends:
- https://exploit.education/ - more virtual machines
- ctftime.org
- https://picoctf.com/ - more CTFs, hosted by CMU
OSINT Hotspots
https://wigle.net/ - a website for collecting information about the different wireless hotspots around the world. - OSint
RISCV assembly hacking boardgame
RISCV assembly hacking boardgame
C pointer board game
Living off the land
https://github.com/LOLBAS-Project/LOLBAS
The goal of the LOLBAS project is to document every binary, script, and library that can be used for Living Off The Land(https://www.crowdstrike.com/cybersecurity-101/living-off-the-land-attacks-lotl/ “Living Off The Land
(https://www.crowdstrike.com/cybersecurity-101/living-off-the-land-attacks-lotl/)“) techniques.
A LOLBin/Lib/Script must:
- Be a Microsoft-signed file, either native to the OS or downloaded from Microsoft.
- Have extra “unexpected” functionality. It is not interesting to document intended use cases.
- Exceptions are application whitelisting bypasses
- Have functionality that would be useful to an APT or red team
OWASP resources
- https://owasp.org/www-project-vulnerableapp/
- https://owasp.org/www-project-webgoat/
- https://owasp.org/www-project-vulnerable-web-applications-directory/
More vulnerable virtual macines:
- Vulnerable webapps and VMs for penetration testing practice: my own list
- The OWASP Vulnerable Web Applications Directory project
- https://www.vulnhub.com/entry/ripper-1,706/
- https://www.doyler.net/security-not-included/vulnhub-sunset-decoy-walkthrough
- https://www.hackingloops.com/kali-linux-virtualbox-pentest-lab/
JWT Security
JSON Web Token (JWT) is an internet standard for creating data with optional signature and/or optional encryption whose payload holds JSON that asserts some number of claims. The tokens are signed either using a private secret or a public/private key. - https://en.wikipedia.org/wiki/JSON_Web_Token
- https://medium.com/@m____b____/demystifying-jwt-authentication-with-python-b4302c39bf91
- https://infosecwriteups.com/jawt-scratchpad-picoctf-93766d81fd8e
- https://portswigger.net/web-security/jwt
Metasploit and Metasploitable
The world’s most used penetration testing framework Knowledge is power, especially when it’s shared. A collaboration between the open source community and Rapid7, Metasploit helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness; it empowers and arms defenders to always stay one step (or two) ahead of the game.
A test environment provides a secure place to perform penetration testing and security research. For your test environment, you need a Metasploit instance that can access a vulnerable target. The following sections describe the requirements and instructions for setting up a vulnerable target.
Guides:
- https://www.hackingloops.com/metasploitable-2/
- https://docs.rapid7.com/metasploit/metasploitable-2-exploitability-guide/
- and more…
OWASP resources
- https://owasp.org/www-project-vulnerableapp/
- https://owasp.org/www-project-webgoat/
- https://owasp.org/www-project-vulnerable-web-applications-directory/
DSVW Docker Container
- https://blog.appsecco.com/damn-small-vulnerable-web-in-docker-fd850ee129d5
- https://hub.docker.com/r/appsecco/dsvw
Cryptography
Downfall.page
Downfall attacks targets a critical weakness found in billions of modern processors used in personal and cloud computers. This vulnerability, identified as CVE-2022-40982, enables a user to access and steal data from other users who share the same computer. For instance, a malicious app obtained from an app store could use the Downfall attack to steal sensitive information like passwords, encryption keys, and private data such as banking details, personal emails, and messages. Similarly, in cloud computing environments, a malicious customer could exploit the Downfall vulnerability to steal data and credentials from other customers who share the same cloud computer.
Social Engineer Toolkit
https://github.com/trustedsec/social-engineer-toolkit
The Social-Engineer Toolkit is an open-source penetration testing framework designed for social engineering. SET has a number of custom attack vectors that allow you to make a believable attack quickly. SET is a product of TrustedSec, LLC – an information security consulting firm located in Cleveland, Ohio.
Introductory Resources
Random Number Manipulation
Hosting CTFd with challenge VMs and virtualization:
https://github.com/aau-network-security/haaukins
Create Randomly Insecure Virtual Machines
https://github.com/cliffe/SecGen
Windows Privilege Escalation Workshop with MetaSploit
https://github.com/sagishahar/lpeworkshop
Binary Exploitation Resources
https://guyinatuxedo.github.io/
Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges. I call it that because it’s a lot of people’s nightmare to get hit by weaponized 0 days, which these skills directly translate into doing that type of work (plus it’s a really cool song).
ROPgadget is a tool that helps automate the process of finding gadgets and building an attack against a binary. ROPgadget searches a binary for useful gadgets and tries to assemble them into an attack payload that starts a shell that accepts commands from the attacker.
DreamHack (EN+KR)
Really great UI https://dreamhack.io/wargame
https://dreamhack.io/ctf/all - Lots of active CTFs
Oldest site I’ve found
https://www.hackthissite.org/ - HackThisSite.org is a free, safe and legal training ground for hackers to test and expand their ethical hacking skills with challenges, CTFs, and more. Active since 2003, we are more than just another hacker wargames site…
- https://www.hackthissite.org/missions/javascript/
- https://www.hackthissite.org/missions/basic/
- https://www.hackthissite.org/missions/playit/extbasic/0/
Steganography
How to integrate Flipper Zero?
I have a Flipper Zero. What can I do with it for the club?
- https://github.com/justcallmekoko/ESP32Marauder/wiki/flipper-zero
- Host fake Wifi login to steal auth credentials https://youtu.be/kNLlvTB5zHs
- Use qFlipper as demo screen
CTFd
CTFd resources:
- https://github.com/bsidessf
- https://owasp.org/www-project-juice-shop/
- Square CTF
- https://github.com/mishrasunny174/encrypt-ctf
- Medium Article on scaling CTFd
CTFd resources:
- https://github.com/bsidessf
- https://owasp.org/www-project-juice-shop/
- https://github.com/mishrasunny174/encrypt-ctf
Netris
Want a basic activity that anyone can do over SSH? Play tetris!
- https://code.rocket9labs.com/tslocum/netris
- https://playnetris.com
ssh YOUR_NAME@netris.rocketnine.space # OR ssh YOUR_NAME@playnetris.com
Github Hacking List
- https://github.com/kkuchta/css-only-chat
- https://github.com/LOLBAS-Project/LOLBAS
- https://github.com/0xffsec/handbook
- https://github.com/pwndbg/pwndbg
- https://github.com/Gallopsled/pwntools
- https://github.com/radareorg/radare2
- https://github.com/NationalSecurityAgency/ghidra
- https://github.com/facebookarchive/fbctf
- https://github.com/moloch--/RootTheBox
- https://github.com/judge0/judge0
- https://github.com/apsdehal/awesome-ctf
- https://github.com/UberGuidoZ/Flipper
- https://github.com/google/kctf
- https://github.com/mcpa-stlouis/hack-the-arch
- https://github.com/aau-network-security/haaukins
- https://github.com/cliffe/SecGen
- https://github.com/DMOJ/judge-server
- https://github.com/adnanaziz/EPIJudge
- https://github.com/judge0/ide
- https://github.com/sagishahar/lpeworkshop
- https://github.com/rapid7/metasploit-framework
- https://github.com/danluu/post-mortems
- https://github.com/fportantier/vulpy
- https://github.com/onlurking/awesome-infosec
- https://github.com/xtiankisutsa/awesome-mobile-CTF
- https://github.com/GTFOBins/GTFOBins.github.io