Resources List
Getting Started
Make sure to sign up for the club on SLI (that’s how we report numbers), and join us on Discord (that’s where all the fun happens). If you play CTF, please join our CTFTime Team!
- Main Website: https://www.osusec.org/
- Club Constitution: https://www.osusec.org/club-constitution/
- Discord: https://discord.gg/2hNARuy
- CTFTime: https://ctftime.org/team/12858
- SLI Signup: https://apps.ideal-logic.com/osusli?key=F3T9-25VWY_5878-CZ4R_bc14da8b
- Discord Bot Walkthrough: See Below
Introductory CTF Material
Interested in getting into Capture The Flag? Check these out! Also join the @CTF role on Discord to participate in CTF with us!
- OSUSEC CTF League: Weekly internal coached CTF: https://www.osusec.org/ctf-league/
- To join, see #announcements or message an officer on Discord.
- CTF101: https://ctf101.org/
- TrailOfBits CTF Field Guide: https://trailofbits.github.io/ctf/
- CS499: Cyber Attacks And Defense (taught by our awesome advisor, Dr. Jang, check out the Lectures at this link): https://cand.unexploitable.systems/cal.html
- PicoCTF Primer: https://primer.picoctf.com/
- pwn.college: https://pwn.college/
- Intro to Binary Exploitation (“Nightmare”): https://guyinatuxedo.github.io/
Tooling
Not all tools will be needed to do most challenges.
- OSUSEC CTF VM Setup (requires gitlab permissions, see #info on discord): https://gitlab.com/osusec/ctf-team/setup
- Flare VM (Windows [Malware] Reversing): https://github.com/fireeye/flare-vm
- Burp Suite (Web/Network Analysis): https://portswigger.net/burp/communitydownload
- Cyber Chef: https://gchq.github.io/CyberChef/
- PwnTools: https://github.com/Gallopsled/pwntools
- IDA FreeWare: https://www.hex-rays.com/products/ida/support/download_freeware/
- Binary Ninja Cloud / Demo: https://binary.ninja/demo/
- NSA Ghidra: https://ghidra-sre.org/
- Installing Ghidra on Windows 10: https://gitlab.com/osusec/resources/-/blob/master/ghidra-windows-10.md
- Zardus’ CTF Tools: https://github.com/zardus/ctf-tools
- Pwndbg: https://github.com/pwndbg/pwndbg
- Installing Autopsy on Debian Based Linux: https://gitlab.com/osusec/resources/-/blob/master/autopsy-linux.md
- Building John The Ripper on Linux: https://gitlab.com/osusec/resources/-/blob/master/john-linux.md
CTF / pwn & Reversing Materials
References and cool sites related to CTF.
- OSUSEC CTF Practice Range: https://ctf.osusec.org/
- References
- Intel x86 Assembly Cheat Sheet: http://www.jegerlehner.ch/intel/IntelCodeTable.pdf
- Yale x86 Assembly Guide: http://flint.cs.yale.edu/cs421/papers/x86-asm/asm.html
- Wikibooks x86 Reference: https://en.wikibooks.org/wiki/X86_Assembly
- Tool Tutorials
- Challenge Archives
- CSAW Past Challenges: https://365.csaw.io/
- ShellStorm Archive: http://shell-storm.org/repo/CTF/
- capture.thefl.ag Archive: https://captf.com/
- Pwndebug Tutorial: https://desc0n0cid0.blogspot.com/2016/09/stack-based-buffer-overflow.html
- Linux Reversing for Beginners: https://osandamalith.com/2019/02/11/linux-reverse-engineering-ctfs-for-beginners/
- OSUSEC Fall 2018 Slides “CS271 for Pwning”: https://docs.google.com/presentation/d/1Ys0tQNGGLpcJlUu3Zkp9V5IyZXo8Cfl7DPv_HWl1xFs/edit?usp=sharing
- Triton Dinamic Binary Analysis: https://triton.quarkslab.com/
- All of CS499 CAND’s References: https://cand.unexploitable.systems/ref.html
- CTF Libraries, Frameworks, Resources, Software, Tutorials: https://github.com/apsdehal/awesome-ctf
- Zardus’ CTF Tools: https://github.com/zardus/ctf-tools
- OSUSEC CTF Practice Range https://ctf.osusec.org/
- BlackHoodie X86-64 Reversing (and more): https://www.youtube.com/channel/UCzOFMTa9idgoZ9b7wWHjLUQ
- ROP Emporium: https://ropemporium.com/
CTF Heap, GOT, LibC, Malloc Materials
Advanced pwn Challenge Materials.
- LibC DB (may be down): http://libcdb.com/
- GOT and PLT for Pwning https://systemoverlord.com/2017/03/19/got-and-plt-for-pwning.html
- Heap Security Checks: https://heap-exploitation.dhavalkapil.com/diving_into_glibc_heap/security_checks.html
- Best Heap Diagram Ever: https://raw.githubusercontent.com/cloudburst/libheap/master/heap.png
- Understanding glibc malloc: https://sploitfun.wordpress.com/2015/02/10/understanding-glibc-malloc/
- MallocInternals: https://sourceware.org/glibc/wiki/MallocInternals
- Azeria Labs: ARM Heap Exploitation: https://azeria-labs.com/heap-exploitation-part-1-understanding-the-glibc-heap-implementation/
- How 2 Heap, by Shellphish: https://github.com/shellphish/how2heap
Open Source INTelligence (OSINT) Materials
Reference material and learning resources about OSINT practices
- OSINT Curious Project: https://osintcurio.us/ or https://twitter.com/OsintCurious
- OSINT Framework Tool Listing: https://osintframework.com/
- Another OSINT Tool Collection: https://cipher387.github.io/osint_stuff_tool_collection
- OSINT Quizzes and News: https://twitter.com/Sector035
- OhShINT GitBook: https://ohshint.gitbook.io/oh-shint-its-a-blog/
Malware / Forensics / Threat Intel
Materials relating to …. well… malware reversing, forensics, threat intelligence and such things.
- Quick bits on Forensics Challenges: https://bitvijays.github.io/LFC-Forensics.html
- Flare VM: https://github.com/fireeye/flare-vm
- Cisco Talos PyreBox: https://github.com/Cisco-Talos/pyrebox
- See bot documentation below about using the
!malware
bot command, and getting access to the #malware channel for discussions of real world exploits and malware. - MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™): http://attack.mitre.org/wiki/Main_Page
CDC Materials
Materials for learning Cyber Defense Competition skills. Join us and learn about CDC in the #cdc channel by adding the CDC role in Discord!
- Vulnerable Machine Images Archive: https://archive.wrccdc.org/images/
Cryptography Materials
Resources pertaining to Cryptography
- CryptoPals: https://cryptopals.com/
- Euler Project: https://projecteuler.net/
- Khan Academy Cryptography Unit: https://www.khanacademy.org/computing/computer-science/cryptography
- Learn Cryptography: https://learncryptography.com/Encryption/
- Dr. Mike Rosulek’s Book: https://web.engr.oregonstate.edu/~rosulekm/crypto/
- SageMath: https://www.sagemath.org/
Web Resources
Web Security Resources
- OWASP Top 10: https://www.owasp.org/index.php/Top_10-2017_Top_10
- OWASP New 2020: https://portswigger.net/polls/top-10-web-hacking-techniques-2020
- Burp Suite (Web/Network Analysis): https://portswigger.net/burp/communitydownload
- Web Security Learning from PortSwigger: https://portswigger.net/web-security
- Google Gruyère Web App Exploit and Defense: https://google-gruyere.appspot.com
Misc
- Many cool lists for hackers: https://github.com/Hack-with-Github/Awesome-Hacking
- LiveOverflow YouTube Channel: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w
- John Hammond YouTube Channel: https://www.youtube.com/channel/UCVeW9qkBjo3zosnqUbG7CFw
- Introduction to macOS Exploitation: https://theevilbit.github.io/posts/getting_started_in_macos_security/
OSUSEC Discord Bot
1. Verify
Once joined, you will see a new DM from our Bot, creatively named OSUSEC Bot. It will ask for your ONID email, and then send you a confirmation token to that email to verify you are an OSU student.
Once you get the token, reply to the bot, and you will be granted Member permissions on the OSUSEC Discord server.
You should see that you have been granted the Member role when you click on your name in the OSUSEC Discord server.
2. Add Roles
Now that you’re in, select the #botspam channel. This is where you will configure your roles.
You may always type !help to get a list of all commands.
To see all roles, run !roles. To add (for example) the ctf role, run !role add ctf – if you are verified, you’ll be able to join in any CTF we play!
Optional: Gitlab
Now, if you have a gitlab.com account, you can run !gitlab <username>
to add yourself to our gitlab group.
Optional Channels
If you are feeling like reviewing some malware, we have a channel named #malware where you may read, discuss and share real world exploit PoCs, malware samples and other such materials.
Of course this comes with an agreement that you will be on good behavior (you agree to abide by the OSUSEC code of ethics and channel rules).
To join, run !malware, and agree to be good by pressing the checkbox.
Also available is a #political-discussion channel, where anyone may engage in protracted discussion touching on politics. This as well comes with an agreement to the OSUSEC code of ethics and channel rules.