Book Image

Kali Linux CTF Blueprints

By : Cameron Buchanan
Book Image

Kali Linux CTF Blueprints

By: Cameron Buchanan

Overview of this book

Table of Contents (14 chapters)
Kali Linux CTF Blueprints
About the Author
About the Reviewers

Exploitation guides

The following section covers the exploit guides for the scenarios created in this chapter. These are guidelines, and there are more ways to exploit the vulnerabilities.

Scenario 1 – decode-alypse now

There's no one way to say, "this is how you deal with encoding," so as with the previous chapter, these exploitation guides will largely be broad suggestions on how to behave with them.

The first thing to do is to see whether you can recognize the encoding type visually. Some are obvious and seen regularly, such as URL, HTML, and Base64 encoding. If you see binary and don't recognize it, you need to find a different job. If you can spot the type straightaway, good for you. Nab yourself a convertor (there are lots online if you don't have one to hand) and go to town.

If you don't recognize it, consider using a tool. Burp comes with a smart decode option, and there are similar tools available on the Internet for doing this. Be sure to verify anything you do get online, and make...