lunes, 10 de enero de 2011

Otros retos shell

Otros retos a traves de shell para practicar:
http://intruded.net/leviathan.html
http://intruded.net/narnia.html
http://intruded.net/behemoth.html
http://intruded.net/utumno.html
http://intruded.net/maze.html
http://intruded.net/manpage.html

http://io.smashthestack.org:84/
http://blowfish.smashthestack.org:81/
http://apfel.smashthestack.org:83/
http://tux.smashthestack.org:86/
http://blackbox.smashthestack.org:85/

http://www.overthewire.org/wargames/vortex/
http://www.overthewire.org/wargames/semtex/
http://www.overthewire.org/wargames/blacksun/
http://www.overthewire.org/wargames/drifter/
http://www.overthewire.org/wargames/krypton/

http://invi.phpnet.us/ <--- Source de ExploitMe y SQLi (Hackit)

http://www.felinemenace.org/~mercy/ <--- Buenos source para practicar

http://community.corest.com/~gera/InsecureProgramming/

http://luna.sc/security-badulake/created-hackit-contests/ <-- dreyer was here :)

http://gulcas.linux.es/?q=hackit <-- Sources del Hackit de la iparty 8 de aditel

http://back2hack.cc/forumdisplay.php?fid=249&page=1 <-- sources para practicar

http://www.shell-storm.org/smashme/

http://hack.thebackupbox.net/

http://www.hackerschool.org --> ssh level1@ftz.hackerschool.org pass: level1
telnet ftz.hackerschool.org
http://w3challs.com/challenges/challenge59 <--- Registrarse y ya ssh con user basic1

http://www.root-me.org <-- 3 retos, shell, binary y rbinary (remote binary)

Updated 30-03-2011:

https://github.com/mabj/ctf_ucon2 <-- Capture The Flag uCon 2009 de Marcos Álvares

http://www.0xdeadbeef.info/code/linux-x86-exploits.tgz <-- Linux/x86 vulnerable code study. Currently, there are 86 example exploits included.

Updated 14-12-2011:

http://exploit-exercises.com/   <--  Linux exploiting from source with Virtual Machine, 3 kind of challenges Nebula - Protostar - Fusion

Updated 23-09-2012:

https://sm0k.org/dojo/vanilla.php <-- Over ssh (ssh vanilla1@vanilladome.sm0k.org -p 13722 pass: vanilla1)  with levels that you must exploit to bypass to the next.

Updated 01-09-2014:

http://pwnable.kr/ <-- We provide various pwn challenges regarding system security. If you succeed to 'pwn' a task, you will be able to read the 'flag' file which contains a secret message. Once you authenticate the flag, you can get the corresponding point. If you are good at system hacking, these tasks would be just a bunch of fun games - enjoy :)

No hay comentarios:

Publicar un comentario