Tools to crack CApTuR3 Th3 ?? Contests.

Tools to crack CApTuR3 Th3 ?? Contests.


1.Cryptography: -.-- ----- ..-   -.- -. --- .--   ... - ..- ..-. ..-.

  • dcode.fr: dCode has a huge library of scripts for decoding or encoding messages with standard cryptography techniques.
  • cryptii.com: Provides many encoding and decoding of ciphers and modular conversions.
  • crackstation: This site is to crack a number of hashes.
  • Base64decode.org: Decode base64 strings to text.
  • Convertstring.com: Decoding Hex, Base64, URL, HTML decoder,Hash crack.
  • Cryptool: CrypTool 1 (CT1) is an open-source Windows program for cryptography and cryptanalysis.

2.Forensics?/??

  • strings: This is a
  • Linux command to extract the printable characters inside a file.
  • binwalk: Binwalk is a tool for searching a given binary image for embedded files and executable code.
  • foremost: Foremost is a forensic data recovery program for Linux used to recover files using their headers, footers, and data structures through a process known as file carving.
  • Exiftool: A command-line application and Perl library for reading and writing EXIF, GPS, IPTC, XMP, maker notes and other meta information in image, audio, and video.
  • xxd: xxd is a Linux command that creates a hex dump of a given file or standard input.
  • JohnTheRipper: It uses brute force attacks, dictionary attacks, and single-crack mode, which is a technique that exploits common password flaws. John the Ripper is an open-source tool that is commonly used to detect weak passwords.

3. Steganography.=+$.jpng

  • Forensically Beta: Forensically is a set of free tools for digital image forensics. It includes clone detection, error level analysis, metadata extraction and more.
  • Steghide: Steghide is a steganography program that is able to hide and extract data in various kinds of image- and audio files.
  • zsteg: zsteg is a tool that can detect hidden data in png and BMP files.
  • pngcheck:.-pngcheck verifies the integrity of PNG, JNG and MNG files (by checking the internal 32-bit CRCs [checksums] and decompressing the image.
  • mp3stego: MP3Stego is a typical steganographic tool for MP3 audio, which embeds secret message into MP3 audio according to the parity of the block length.
  • Spectrum Analyzer: This tool analyzes the spectrum of the audio files for any hidden data.

4. Networking related Challenges...`1`1`1`1`1

  • Wireshark/tshark: TShark is a terminal oriented version of Wireshark designed for capturing and displaying packets when an interactive user interface isn't necessary or available.
  • tcpdump: A powerful command-line packet analyzer; and libpcap, a portable C/C++ library for network traffic capture.
  • netcat: Ncat is a general-purpose command-line tool for reading, writing, redirecting, and encrypting data across a network.
  • nmap: Free Security Scanner, Port Scanner, & Network Exploration Tool. 

5.Reverse Engineering>#[4$

  • dex2jar: Dex2Jar is a freely available tool to work with Android “.dex” and Java “.class” files. As you may aware that “.dex” files are compiled Android application code files
  • apktool: A tool for reverse engineering Android apk files.
  • Ghidra: A tool that lets you intercept methods, alter data and otherwise hack Java applications running on your computer.

6.OSINT (Open Source Intelligence).,.><

  • Maltego: Maltego is an interactive data mining tool that renders directed graphs for link analysis. The tool is used in online investigations for finding relationships between pieces of information from various sources located on the Internet.
  • Shodan: Shodan is a type of search engine that allows users to search for Internet-connected devices and explicit website information such as the type of software running on a particular system and local anonymous FTP servers.
  • Recon-ng: This is a full-featured Web Reconnaissance framework written in Python. Complete with independent modules, database interaction, built-in convenience.

7. Web Category<!____--f1nd ur fl4g__>>

  • Burpsuite: A graphical tool to testing website security.
  • OWASP ZAP: Intercepting proxy to replay, debug, and fuzz HTTP requests and responses.
  • SQLMap: Automatic SQL injection and database takeover tool. 
  • Postman: Add on for chrome for debugging network requests.
Anmol Rao Karukonda

Data Science Masters Student | Actively looking for Internship

4 年

Thanks boss....that was really helpful

要查看或添加评论,请登录

社区洞察

其他会员也浏览了