Posted: . At: 6:38 PM. This was 5 years ago. Post ID: 13525
Page permalink. WordPress uses cookies, or tiny pieces of information stored on your computer, to verify who you are. There are cookies for logged in users and for commenters.
These cookies expire two weeks after they are set.


Very useful resources for learning penetration testing and Linux commands.


CysCA hacking challenge penetration testing results, how students overcame a few vulnerable network servers and successfully captured flags.

Students Write-ups.

A number of write-ups submitted by the students on the day, this is a document of their solutions for the challenge.

https://www.cyberchallenge.com.au/pdf/CySCA2018-Students.pdf.

Active Defense pentest.

https://www.cyberchallenge.com.au/pdf/CySCA2018-Active_Defence_Questions.pdf.

These resources might give you some pointers when tasked with a hard penetration testing task, seeing how someone else did it could really help you out.

Some misc penetration testing tasks and how they were overcome.

https://www.cyberchallenge.com.au/pdf/CySCA2018-Miscellaneous.pdf.

Some very useful tips on reverse engineering an executable and using netcat. Both of which are very useful. Netcat can be used to create a listener on another machine that can receive a message from a remote machine.

CysCA 2018 virtual machine files. Useful for practicing penetration testing in a virtual environment. 2.1 GiB.

https://cyberchallenge.com.au/2018/inabox/CySCA18-inabox.7z.

More information.
https://www.cyberchallenge.com.au/2018/inabox/index.html.

I think this is a very useful set of documents to help out students of penetration testing and Linux in general. Knowing how to use netcat and exploit SSH as well as Wireshark is very useful. There are so many vulnerable servers out there that need hardening. This is a good opportunity to learn from past challenges and pick up some skills.


Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.