Want to read my ramblings?

I write what I write, read if you read.

CTF Tools

Posted at — Feb 23, 2020

This is going to be more of a long running list of tools that I have used while doing CTFs. There’s a good chance that I’ll update/append to it as time goes on. Possibly there’ll also be the odd write up of specifics on how I use the tool.

Gobuster

Used for finding directory traversal on a web host.

Install:

go get github.com/OJ/gobuster

Usage:

curl -O https://raw.githubusercontent.com/digination/dirbuster-ng/master/wordlists/small.txt
gobuster dir -k -u http://$IP  -w small.txt

Exploit Database

Exploit-db is a great place for finding known exploitable vulnerabilities in software. Great if you know which version of software something is running.

Metasploit

If it’s a known exploit, good chance that metasploit has a module to exploit it.

Install:

curl https://raw.githubusercontent.com/rapid7/metasploit-omnibus/master/config/templates/metasploit-framework-wrappers/msfupdate.erb > msfinstall && \
  chmod 755 msfinstall && \
  ./msfinstall

Usage:

See the quick start guide.

Upgrade to full shell with python

If you have a reverse shell, but it’s a pain to use, and python is installed. Try this:

python -c 'import pty; pty.spawn("/bin/bash")'

More exciting payloads can be found at https://github.com/swisskyrepo/PayloadsAllTheThings

Fcrackzip

For cracking password protected Zip files

curl -L https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt > rockyou.txt
fcrackzip -v -D -p rockyou.txt archive.zip

Find SUID bit set

find / -perm -u=s -type f 2>/dev/null

Other tools

Just a quick dump of general tools that I use all the time: