summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMalfurious <m@lfurio.us>2024-02-22 02:24:24 -0500
committerMalfurious <m@lfurio.us>2024-02-22 02:24:24 -0500
commit6bd3b3f194d10bca2d8e45a64e94c2e05b8a9d21 (patch)
treebcab1e8a43ad78c5bcf4d4fafafc4014444b5dcf
parentb70b491314e5e0fc36372608ab952fba5e0fdb8d (diff)
parent8711d4946213a87699e6a20f6cd1db57170bf523 (diff)
downloadlib-des-gnux-6bd3b3f194d10bca2d8e45a64e94c2e05b8a9d21.tar.gz
lib-des-gnux-6bd3b3f194d10bca2d8e45a64e94c2e05b8a9d21.zip
Merge branch 'malf-bitsctf-2024'
* malf-bitsctf-2024: RSA link to factordb Consolidate forensics links and add FTKImager and volatility BITSCTF 2024 results
-rw-r--r--docs/crypto/rsa.txt6
-rw-r--r--docs/forensics/AperiSolve.txt2
-rw-r--r--docs/forensics/CyberChef.txt2
-rw-r--r--docs/forensics/forensics_links.txt17
-rw-r--r--docs/forensics/qr_code_recovery.txt1
-rw-r--r--scores.txt2
6 files changed, 25 insertions, 5 deletions
diff --git a/docs/crypto/rsa.txt b/docs/crypto/rsa.txt
index a047f07..f9442fc 100644
--- a/docs/crypto/rsa.txt
+++ b/docs/crypto/rsa.txt
@@ -41,3 +41,9 @@ To perform fast mod expo for encryption, use pow(plaintext, e, n)
... for decryption, use pow(cyphertext, d, n)
To calculate mod inverse, use pow(e, -1, phi).
+
+
+
+Extras
+------
+http://factordb.com/
diff --git a/docs/forensics/AperiSolve.txt b/docs/forensics/AperiSolve.txt
deleted file mode 100644
index d3c6e00..0000000
--- a/docs/forensics/AperiSolve.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-https://www.aperisolve.fr/
-https://github.com/Zeecka/AperiSolve
diff --git a/docs/forensics/CyberChef.txt b/docs/forensics/CyberChef.txt
deleted file mode 100644
index 068c417..0000000
--- a/docs/forensics/CyberChef.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-https://gchq.github.io/CyberChef/
-https://github.com/gchq/CyberChef
diff --git a/docs/forensics/forensics_links.txt b/docs/forensics/forensics_links.txt
new file mode 100644
index 0000000..e72f578
--- /dev/null
+++ b/docs/forensics/forensics_links.txt
@@ -0,0 +1,17 @@
+# Online stego solver and image file analyzer
+https://www.aperisolve.fr/
+https://github.com/Zeecka/AperiSolve
+
+# Online visual data transformation pipeline editor
+https://gchq.github.io/CyberChef/
+https://github.com/gchq/CyberChef
+
+# Online QR code recovery tool
+https://merricx.github.io/qrazybox/
+
+# Read / export from *.ad1 disk images
+https://www.exterro.com/digital-forensics-software/ftk-imager
+
+# Analyze memory dumps (Windows, maybe Linux)
+https://www.golinuxcloud.com/analyzing-volatility-memory-dump/
+https://github.com/volatilityfoundation/volatility
diff --git a/docs/forensics/qr_code_recovery.txt b/docs/forensics/qr_code_recovery.txt
deleted file mode 100644
index 1c89057..0000000
--- a/docs/forensics/qr_code_recovery.txt
+++ /dev/null
@@ -1 +0,0 @@
-https://merricx.github.io/qrazybox/
diff --git a/scores.txt b/scores.txt
index e5cddeb..037e3ab 100644
--- a/scores.txt
+++ b/scores.txt
@@ -25,3 +25,5 @@ X-MAS CTF 2022 1123 66 /816 (1451)
lactf 2023 5683 98 /980
UMass CTF 2023 965 40 /571
RITSEC CTF 2023 3472 72 /712 (717)
+
+BITSCTF 2024 1040 93 /921