MiyaSun
App - Script
0 Points 0/14
- o Bash - System 1
- o sudo - faiblesse de configuration
- o Bash - System 2
- o Perl - Command injection
- o Bash - cron
- o Python - input()
- o Python - pickle
- o Python - PyJail 1
- o Bash/Awk - parsing netstat
- o Python - PyJail 2
- o Python - Jail - Exec
- o Javascript - Jail
- o Python - Jail - Garbage collector
- o Shells restreints
0%
App - Système
0 Points 0/58
- o ELF x86 - Stack buffer overflow basic 1
- o ELF x86 - Stack buffer overflow basic 2
- o ELF x86 - Format string bug basic 1
- o ELF x64 - Stack buffer overflow - basic
- o ELF x86 - Format string bug basic 2
- o ELF x86 - Race condition
- o ELF ARM - Stack buffer overflow - basic
- o ELF x86 - Stack buffer overflow basic 3
- o ELF ARM - Stack Spraying
- o ELF x86 - BSS buffer overflow
- o ELF x86 - Stack buffer overflow basic 4
- o ELF x86 - Stack buffer overflow basic 6
- o ELF x86 - Format String Bug Basic 3
- o ELF ARM - Basic ROP
- o ELF x86 - Stack buffer overflow - C++ vtables
- o ELF x64 - Logic bug
- o ELF x86 - Bug Hunting - Plusieurs problèmes
- o ELF x86 - Stack buffer and integer overflow
- o ELF x86 - Stack buffer overflow basic 5
- o ELF x64 - Stack buffer overflow - avancé
- o ELF x86 - Information leakage with Stack Smashing Protector
- o ELF ARM - Race condition
- o ELF x86 - Out of bounds attack - French Paradox
- o ELF x86 - Remote BSS buffer overflow
- o ELF x86 - Remote Format String bug
- o ELF x64 - Remote heap buffer overflow - fastbin
- o ELF x86 - Blind remote format string bug
- o LinKern ARM - syscall vulnérable
- o LinKern x86 - Buffer overflow basic 1
- o LinKern x86 - Null pointer dereference
- o LinKern x64 - Race condition
- o ELF ARM - Shellcode alphanumérique
- o ELF x86 - Hardened binary 1
- o ELF x86 - Hardened binary 2
- o ELF x86 - Hardened binary 3
- o ELF x86 - Hardened binary 4
- o LinKern x64 - code réentrant
- o ELF ARM - Heap format string bug
- o ELF x64 - Sigreturn Oriented Programming
- o LinKern x86 - basic ROP
- o ELF ARM - Format String bug
- o ELF ARM - Use After Free
- o ELF x64 - Heap feng-shui
- o ELF x64 - Off-by-one bug
- o ELF x86 - Hardened binary 5
- o LinKern ARM - Stack Overflow
- o ELF ARM - Heap Off-by-One
- o ELF x64 - Remote Heap buffer overflow 1
- o ELF x86 - Hardened binary 6
- o ELF x86 - Hardened binary 7
- o ELF x86 - Remote stack buffer overflow - Hardened
- o ELF ARM - Heap buffer overflow - Wilderness
- o ELF ARM - Heap Overflow
- o ELF x64 - Seccomp Whitelist
- o ELF x86 - Blind ROP
- o Linkern x64 - Memory exploration
- o ELF x64 - Remote Heap buffer overflow 2
- o ELF x64 - Blind ROP
0%
Cracking
0 Points 0/28
- o ELF - 0 protection
- o ELF - x86 Basique
- o PE - 0 protection
- o ELF C++ - 0 protection
- o PE DotNet - 0 protection
- o ELF - Fake Instructions
- o ELF - Ptrace
- o ELF ARM - basic crackme
- o PYC - ByteCode
- o ELF - Pas de points d’arrêt logiciels
- o MachO x64 - keygenme or not
- o ELF - CrackPass
- o ELF - ExploitMe
- o ELF - Random Crackme
- o ELF ARM - crackme 1337
- o PDF - Javascript
- o ELF ARM - Crypted
- o PE - SEHVEH
- o APK - Anti-debug
- o ELF - Anti-debug
- o ELF x64 - Nanomites - Introduction
- o PE - AutoPE
- o ELF - KeygenMe
- o ELF x64 - Anti-debug et equations
- o ELF - Packed
- o ELF x64 - Nanomites
- o PE - RunPE
- o ELF - VM
0%
Cryptanalyse
0 Points 0/37
- o Encodage - ASCII
- o Encodage - UU
- o Hash - Message Digest 5
- o Hash - SHA-2
- o Chiffrement par décalage
- o Décomposition pixelisée
- o ELF32 - Chiffrement avec le PID
- o Fichier - PKZIP
- o Substitution monoalphabétique - César
- o Clair connu - XOR
- o Code - Pseudo Random Number Generator
- o File - Insecure storage 1
- o Substitution polyalphabétique - Vigenère
- o Système - Android lock pattern
- o Transposition - Rail Fence
- o AES - ECB
- o LFSR - Clair connu
- o RSA - Factorisation
- o RSA - Oracle de déchiffrement
- o Service - Timing attack
- o Substitution monoalphabétique - Polybe
- o Vecteur d’initialisation
- o GEDEFU
- o RSA - Clé privée corrompue V1
- o RSA - Fractions continues
- o RSA - Modules communs
- o Service - Hash length extension attack
- o RSA - Padding
- o AES128 - CTR
- o Problème du logarithme discret
- o RSA - Clé privée corrompue V2
- o RSA - Multiples destinataires
- o Machine Enigma
- o ECDHE
- o Service - CBC Padding
- o Substitution polyalphabétique - Masque jetable
- o Hash - SHA-3
0%
Forensic
0 Points 0/20
- o Command & Control - niveau 2
- o Analyse de logs - attaque web
- o Command & Control - niveau 5
- o Trouvez le chat
- o Vilain petit canard
- o Active Directory - GPO
- o Command & Control - niveau 3
- o Exfiltration DNS
- o Command & Control - niveau 4
- o Entretien à l’ANSSI
- o Macro Word malveillante
- o Ransomware Android
- o Insomni’Droid
- o Root My Droid
- o Command & Control - niveau 6
- o Find me
- o Second entretien à l’ANSSI
- o Find me again
- o Zeus Bot
- o Try again
0%
Réaliste
10 Points 1/26
- x Eh oui, parfois
- o P0wn3d
- o The h@ckers l4b
- o Néonazi à l’intérieur
- o PyRat Enchères
- o Root them
- o IPBX - call me maybe
- o Marabout
- o Root-We
- o Starbug Bounty
- o Ultra Upload
- o Imagick
- o MALab
- o Web TV
- o SamBox v2
- o SamCMS
- o SamBox v1
- o SAP Pentest 007
- o Crypto Secure
- o Red Pills
- o SamBox v3
- o ARM FTP Box
- o SAP Pentest 000
- o Bluebox 2 - Pentest
- o Bluebox - Pentest
- o Highway to shell
4%
Réseau
25 Points 3/17
- x FTP - Authentification
- x TELNET - authentification
- o ETHERNET - trame
- x Authentification twitter
- o CISCO - mot de passe
- o DNS - transfert de zone
- o IP - Time To Live
- o LDAP - null bind
- o SIP - Authentification
- o ETHERNET - Transmission altérée
- o Trafic Global System for Mobile communications
- o SSL - échange HTTP
- o Netfilter - erreurs courantes
- o SNMP - Authentification
- o Wired Equivalent Privacy
- o Charge ICMP
- o XMPP - Authentification
18%
Stéganographie
0 Points 0/16
- o Gunnm
- o Pas très carré
- o Point à la ligne
- o Steganomobile
- o Twitter Secret Messages
- o Du bruit
- o George et Alfred
- o Audio stégano
- o Base Jumper
- o Objet PDF
- o We need to go deeper
- o Angecryption
- o LSB - Un canard qui pèse son poids
- o Pixel Indicator Technique
- o Pixel Value Differencing
- o Crypt-art
0%
Web - Client
10 Points 2/19
- o HTML - boutons désactivés
- x Javascript - Authentification
- x Javascript - Source
- o Javascript - Authentification 2
- o Javascript - Obfuscation 1
- o Javascript - Obfuscation 2
- o Javascript - Native code
- o Javascript - Obfuscation 3
- o XSS - Stockée 1
- o CSRF - 0 protection
- o Flash - Authentification
- o CSRF - contournement de jeton
- o XSS - Volatile
- o Javascript - Obfuscation 4
- o XSS - Stockée 2
- o HTTP Response Splitting
- o Javascript - Obfuscation 5
- o XSS - Stored - contournement de filtres
- o XSS - DOM Based
11%
Web - Serveur
15 Points 2/54
- x HTML
- o HTTP - Open redirect
- o Injection de commande
- x Mot de passe faible
- o User-agent
- o Fichier de sauvegarde
- o HTTP directory indexing
- o HTTP Headers
- o HTTP verb tampering
- o Install files
- o Redirection invalide
- o CRLF
- o File upload - double extensions
- o File upload - type MIME
- o HTTP cookies
- o Directory traversal
- o File upload - null byte
- o PHP assert()
- o PHP filters
- o PHP register globals
- o File upload - ZIP
- o Injection de commande - contournement de filtre
- o Local File Inclusion
- o Local File Inclusion - Double encoding
- o PHP - Loose Comparison
- o PHP preg_replace()
- o PHP type juggling
- o Remote File Inclusion
- o Server-side Template Injection
- o SQL injection - authentification
- o SQL injection - authentification - GBK
- o SQL injection - string
- o XSLT - Code execution
- o LDAP injection - authentification
- o NoSQL injection - authentification
- o Path Truncation
- o PHP Sérialisation
- o SQL injection - numérique
- o SQL Injection - Routed
- o SQL Truncation
- o XML External Entity
- o XPath injection - authentification
- o Java - Spring Boot
- o Local File Inclusion - Wrappers
- o SQL injection - Error
- o SQL injection - Insert
- o SQL injection - lecture de fichiers
- o XPath injection - string
- o NoSQL injection - en aveugle
- o SQL injection - Time based
- o SQL injection - en aveugle
- o LDAP injection - en aveugle
- o XPath injection - en aveugle
- o SQL injection - contournement de filtres
4%