diff options
author | Malfurious <m@lfurio.us> | 2024-02-22 02:24:24 -0500 |
---|---|---|
committer | Malfurious <m@lfurio.us> | 2024-02-22 02:24:24 -0500 |
commit | 6bd3b3f194d10bca2d8e45a64e94c2e05b8a9d21 (patch) | |
tree | bcab1e8a43ad78c5bcf4d4fafafc4014444b5dcf | |
parent | b70b491314e5e0fc36372608ab952fba5e0fdb8d (diff) | |
parent | 8711d4946213a87699e6a20f6cd1db57170bf523 (diff) | |
download | lib-des-gnux-6bd3b3f194d10bca2d8e45a64e94c2e05b8a9d21.tar.gz lib-des-gnux-6bd3b3f194d10bca2d8e45a64e94c2e05b8a9d21.zip |
Merge branch 'malf-bitsctf-2024'
* malf-bitsctf-2024:
RSA link to factordb
Consolidate forensics links and add FTKImager and volatility
BITSCTF 2024 results
-rw-r--r-- | docs/crypto/rsa.txt | 6 | ||||
-rw-r--r-- | docs/forensics/AperiSolve.txt | 2 | ||||
-rw-r--r-- | docs/forensics/CyberChef.txt | 2 | ||||
-rw-r--r-- | docs/forensics/forensics_links.txt | 17 | ||||
-rw-r--r-- | docs/forensics/qr_code_recovery.txt | 1 | ||||
-rw-r--r-- | scores.txt | 2 |
6 files changed, 25 insertions, 5 deletions
diff --git a/docs/crypto/rsa.txt b/docs/crypto/rsa.txt index a047f07..f9442fc 100644 --- a/docs/crypto/rsa.txt +++ b/docs/crypto/rsa.txt @@ -41,3 +41,9 @@ To perform fast mod expo for encryption, use pow(plaintext, e, n) ... for decryption, use pow(cyphertext, d, n) To calculate mod inverse, use pow(e, -1, phi). + + + +Extras +------ +http://factordb.com/ diff --git a/docs/forensics/AperiSolve.txt b/docs/forensics/AperiSolve.txt deleted file mode 100644 index d3c6e00..0000000 --- a/docs/forensics/AperiSolve.txt +++ /dev/null @@ -1,2 +0,0 @@ -https://www.aperisolve.fr/ -https://github.com/Zeecka/AperiSolve diff --git a/docs/forensics/CyberChef.txt b/docs/forensics/CyberChef.txt deleted file mode 100644 index 068c417..0000000 --- a/docs/forensics/CyberChef.txt +++ /dev/null @@ -1,2 +0,0 @@ -https://gchq.github.io/CyberChef/ -https://github.com/gchq/CyberChef diff --git a/docs/forensics/forensics_links.txt b/docs/forensics/forensics_links.txt new file mode 100644 index 0000000..e72f578 --- /dev/null +++ b/docs/forensics/forensics_links.txt @@ -0,0 +1,17 @@ +# Online stego solver and image file analyzer +https://www.aperisolve.fr/ +https://github.com/Zeecka/AperiSolve + +# Online visual data transformation pipeline editor +https://gchq.github.io/CyberChef/ +https://github.com/gchq/CyberChef + +# Online QR code recovery tool +https://merricx.github.io/qrazybox/ + +# Read / export from *.ad1 disk images +https://www.exterro.com/digital-forensics-software/ftk-imager + +# Analyze memory dumps (Windows, maybe Linux) +https://www.golinuxcloud.com/analyzing-volatility-memory-dump/ +https://github.com/volatilityfoundation/volatility diff --git a/docs/forensics/qr_code_recovery.txt b/docs/forensics/qr_code_recovery.txt deleted file mode 100644 index 1c89057..0000000 --- a/docs/forensics/qr_code_recovery.txt +++ /dev/null @@ -1 +0,0 @@ -https://merricx.github.io/qrazybox/ @@ -25,3 +25,5 @@ X-MAS CTF 2022 1123 66 /816 (1451) lactf 2023 5683 98 /980 UMass CTF 2023 965 40 /571 RITSEC CTF 2023 3472 72 /712 (717) + +BITSCTF 2024 1040 93 /921 |