From 1ec5a2b97f5a30cd7c393e543446675707381db7 Mon Sep 17 00:00:00 2001 From: Malfurious Date: Thu, 22 Feb 2024 01:56:51 -0500 Subject: BITSCTF 2024 results Signed-off-by: Malfurious --- scores.txt | 2 ++ 1 file changed, 2 insertions(+) diff --git a/scores.txt b/scores.txt index e5cddeb..037e3ab 100644 --- a/scores.txt +++ b/scores.txt @@ -25,3 +25,5 @@ X-MAS CTF 2022 1123 66 /816 (1451) lactf 2023 5683 98 /980 UMass CTF 2023 965 40 /571 RITSEC CTF 2023 3472 72 /712 (717) + +BITSCTF 2024 1040 93 /921 -- cgit v1.2.3 From 76762d3d7789247a83edda4a9be6442778a6679d Mon Sep 17 00:00:00 2001 From: Malfurious Date: Thu, 22 Feb 2024 02:04:44 -0500 Subject: Consolidate forensics links and add FTKImager and volatility Signed-off-by: Malfurious --- docs/forensics/AperiSolve.txt | 2 -- docs/forensics/CyberChef.txt | 2 -- docs/forensics/forensics_links.txt | 17 +++++++++++++++++ docs/forensics/qr_code_recovery.txt | 1 - 4 files changed, 17 insertions(+), 5 deletions(-) delete mode 100644 docs/forensics/AperiSolve.txt delete mode 100644 docs/forensics/CyberChef.txt create mode 100644 docs/forensics/forensics_links.txt delete mode 100644 docs/forensics/qr_code_recovery.txt diff --git a/docs/forensics/AperiSolve.txt b/docs/forensics/AperiSolve.txt deleted file mode 100644 index d3c6e00..0000000 --- a/docs/forensics/AperiSolve.txt +++ /dev/null @@ -1,2 +0,0 @@ -https://www.aperisolve.fr/ -https://github.com/Zeecka/AperiSolve diff --git a/docs/forensics/CyberChef.txt b/docs/forensics/CyberChef.txt deleted file mode 100644 index 068c417..0000000 --- a/docs/forensics/CyberChef.txt +++ /dev/null @@ -1,2 +0,0 @@ -https://gchq.github.io/CyberChef/ -https://github.com/gchq/CyberChef diff --git a/docs/forensics/forensics_links.txt b/docs/forensics/forensics_links.txt new file mode 100644 index 0000000..e72f578 --- /dev/null +++ b/docs/forensics/forensics_links.txt @@ -0,0 +1,17 @@ +# Online stego solver and image file analyzer +https://www.aperisolve.fr/ +https://github.com/Zeecka/AperiSolve + +# Online visual data transformation pipeline editor +https://gchq.github.io/CyberChef/ +https://github.com/gchq/CyberChef + +# Online QR code recovery tool +https://merricx.github.io/qrazybox/ + +# Read / export from *.ad1 disk images +https://www.exterro.com/digital-forensics-software/ftk-imager + +# Analyze memory dumps (Windows, maybe Linux) +https://www.golinuxcloud.com/analyzing-volatility-memory-dump/ +https://github.com/volatilityfoundation/volatility diff --git a/docs/forensics/qr_code_recovery.txt b/docs/forensics/qr_code_recovery.txt deleted file mode 100644 index 1c89057..0000000 --- a/docs/forensics/qr_code_recovery.txt +++ /dev/null @@ -1 +0,0 @@ -https://merricx.github.io/qrazybox/ -- cgit v1.2.3 From 8711d4946213a87699e6a20f6cd1db57170bf523 Mon Sep 17 00:00:00 2001 From: Malfurious Date: Thu, 22 Feb 2024 02:18:27 -0500 Subject: RSA link to factordb Signed-off-by: Malfurious --- docs/crypto/rsa.txt | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/docs/crypto/rsa.txt b/docs/crypto/rsa.txt index a047f07..f9442fc 100644 --- a/docs/crypto/rsa.txt +++ b/docs/crypto/rsa.txt @@ -41,3 +41,9 @@ To perform fast mod expo for encryption, use pow(plaintext, e, n) ... for decryption, use pow(cyphertext, d, n) To calculate mod inverse, use pow(e, -1, phi). + + + +Extras +------ +http://factordb.com/ -- cgit v1.2.3