Otros retos a traves de shell para practicar:
http://intruded.net/leviathan.html
http://intruded.net/narnia.html
http://intruded.net/behemoth.html
http://intruded.net/utumno.html
http://intruded.net/maze.html
http://intruded.net/manpage.html
http://io.smashthestack.org:84/
http://blowfish.smashthestack.org:81/
http://apfel.smashthestack.org:83/
http://tux.smashthestack.org:86/
http://blackbox.smashthestack.org:85/
http://www.overthewire.org/wargames/vortex/
http://www.overthewire.org/wargames/semtex/
http://www.overthewire.org/wargames/blacksun/
http://www.overthewire.org/wargames/drifter/
http://www.overthewire.org/wargames/krypton/
http://invi.phpnet.us/ <--- Source de ExploitMe y SQLi (Hackit)
http://www.felinemenace.org/~mercy/ <--- Buenos source para practicar
http://community.corest.com/~gera/InsecureProgramming/
http://luna.sc/security-badulake/created-hackit-contests/ <-- dreyer was here :)
http://gulcas.linux.es/?q=hackit <-- Sources del Hackit de la iparty 8 de aditel
http://back2hack.cc/forumdisplay.php?fid=249&page=1 <-- sources para practicar
http://www.shell-storm.org/smashme/
http://hack.thebackupbox.net/
http://www.hackerschool.org --> ssh level1@ftz.hackerschool.org pass: level1
telnet ftz.hackerschool.org
http://w3challs.com/challenges/challenge59 <--- Registrarse y ya ssh con user basic1
http://www.root-me.org <-- 3 retos, shell, binary y rbinary (remote binary)
Updated 30-03-2011:
https://github.com/mabj/ctf_ucon2 <-- Capture The Flag uCon 2009 de Marcos Álvares
http://www.0xdeadbeef.info/code/linux-x86-exploits.tgz <-- Linux/x86 vulnerable code study. Currently, there are 86 example exploits included.
Updated 14-12-2011:
http://exploit-exercises.com/ <-- Linux exploiting from source with Virtual Machine, 3 kind of challenges Nebula - Protostar - Fusion
Updated 23-09-2012:
https://sm0k.org/dojo/vanilla.php <-- Over ssh (ssh vanilla1@vanilladome.sm0k.org -p 13722 pass: vanilla1) with levels that you must exploit to bypass to the next.
Updated 01-09-2014:
http://pwnable.kr/ <-- We provide various pwn challenges regarding system security. If you succeed to 'pwn' a task, you will be able to read the 'flag' file which contains a secret message. Once you authenticate the flag, you can get the corresponding point. If you are good at system hacking, these tasks would be just a bunch of fun games - enjoy :)
No hay comentarios:
Publicar un comentario