<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: zoey</title>
    <description>The latest articles on DEV Community by zoey (@z0ey777).</description>
    <link>https://dev.to/z0ey777</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F703307%2F2f666a72-1c6c-49c2-843a-b0a9a191effa.png</url>
      <title>DEV Community: zoey</title>
      <link>https://dev.to/z0ey777</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/z0ey777"/>
    <language>en</language>
    <item>
      <title>CyberSoc | Cyber Detective CTF </title>
      <dc:creator>zoey</dc:creator>
      <pubDate>Mon, 20 Sep 2021 15:04:58 +0000</pubDate>
      <link>https://dev.to/z0ey777/cybersoc-cyber-detective-ctf-dp2</link>
      <guid>https://dev.to/z0ey777/cybersoc-cyber-detective-ctf-dp2</guid>
      <description>&lt;p&gt;Cyber Detective CTF is an OSINT-focussed CTF created by the Cyber Society at Cardiff University. There are 40 challenges across 3 streams : General Knowledge, Life Online and Evidence Investigation.&lt;br&gt;
Link to the Website : &lt;a href="https://ctf.cybersoc.wales/challenges"&gt;https://ctf.cybersoc.wales/challenges&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Stream : General Knowledge &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;spy&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;OSINT....&lt;br&gt;
Its an acronym you might have heard before, but what could it mean?&lt;/p&gt;

&lt;p&gt;Ans : Open Source Intelligence&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;hush&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It keeps all of your private information safe as it swirls through the internet, what does HTTPS stand for?&lt;/p&gt;

&lt;p&gt;Ans: Hypertext Transfer Protocol Secure&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ported&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Your computer gives a 'port' to applications that need to access a network. What is the port number of HTTPS?&lt;/p&gt;

&lt;p&gt;Ans : 443&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;sluggish&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A third of the internet is vulnerable to it [sorry Apache :-( ].&lt;br&gt;
Its an attack on web servers which requires minimal bandwidth but can bring a server to its knees by opening loads of connections and keeping them alive with tiny amounts of data.&lt;br&gt;
What is it called?&lt;br&gt;
Hint: the name of a certain animal is a part of the word.&lt;/p&gt;

&lt;p&gt;Ans : Slowloris&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;wifilock&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Your wifi box at home uses it to stop nosy neighbors from trying to steal your internet connection so they don't have to pay for their own.&lt;br&gt;
It can even stop someone from parking outside your house and hoovering up all of that sensitive data flying through the air.&lt;br&gt;
Its the worlds most popular way to protect a wireless access point, but what acronym is it known by?&lt;/p&gt;

&lt;p&gt;Ans : WPA2&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;fishy&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It can sniff anything travelling along a wire. Mouse clicks. Keyboard taps. Your password. Your credit card number. That message you didn't want anyone to see...&lt;br&gt;
The worlds most popular protocol analyser. What's it called?&lt;/p&gt;

&lt;p&gt;Ans : Wireshark&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;iknowyourname&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It is a website which allows you to view a worldwide map of wireless access points / wifi routers.&lt;br&gt;
They can be filtered by name, the time of capture and more.&lt;br&gt;
What is the name of this online service?&lt;/p&gt;

&lt;p&gt;Ans : Wigle&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;urlsafe&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It is a way of taking binary data and turning it into text so that it's more easily transmitted in things like e-mail and HTML form data.&lt;br&gt;
It's a textual encoding of binary data where the resultant text has nothing but letters, numbers and the symbols "+", "/" and "=".&lt;br&gt;
It turns hello*world# into aGVsbG8qd29ybGQj&lt;br&gt;
What is the name of this encoding method?&lt;/p&gt;

&lt;p&gt;Ans : base64&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;outinthestreets&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Its the tool by one of the world's largest tech firms which lets you see what its like to stand on the streets anywhere on planet Earth... yet we bet the first place you looked at was your own house.&lt;br&gt;
What is this tool called?&lt;/p&gt;

&lt;p&gt;Ans : Google Streetview&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;bleepbloop&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Its a globally recognized way of broadcasting SOS. It can manifest as flashes of light, beeping, knocking, writing and more in order to broadcast individual letters which are joined together by the recipient to make meaningful sentences.&lt;br&gt;
.... . .-.. .-.. ---&lt;br&gt;
What is the name of this particular code?&lt;/p&gt;

&lt;p&gt;Ans : Morse&lt;/p&gt;

</description>
      <category>cybersoc</category>
      <category>cyberdetectivectf</category>
      <category>ctf</category>
      <category>osintctf</category>
    </item>
    <item>
      <title>CyberSoc | Cyber Detective CTF </title>
      <dc:creator>zoey</dc:creator>
      <pubDate>Sat, 18 Sep 2021 17:20:07 +0000</pubDate>
      <link>https://dev.to/z0ey777/cybersoc-cyber-detective-ctf-lah</link>
      <guid>https://dev.to/z0ey777/cybersoc-cyber-detective-ctf-lah</guid>
      <description>&lt;p&gt;Cyber Detective CTF is an OSINT-focussed CTF created by the Cyber Society at Cardiff University. There are 40 challenges across 3 streams : General Knowledge, Life Online and Evidence Investigation.&lt;br&gt;
Link to the Website : &lt;a href="https://ctf.cybersoc.wales/"&gt;https://ctf.cybersoc.wales/&lt;/a&gt;&lt;br&gt;
Here's a way how I approached these challeges &lt;br&gt;
Stream : Life Online&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;voteforme&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://twitter.com/jammymarkson"&gt;https://twitter.com/jammymarkson&lt;/a&gt;&lt;br&gt;
You'd have thought politics was a bit of a dry subject; not for some.&lt;br&gt;
What US political party does James over here support?&lt;/p&gt;

&lt;p&gt;Ans : Look for the party the James is interested in. Barack Obama was in this party.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;growingup&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Where did James spend his childhood?&lt;/p&gt;

&lt;p&gt;Ans : go to what3words.com and in map search for ///push.asking.barn.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;choochoo&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We need to make sure James is far away when we try and break into his house.&lt;br&gt;
In what city does James work?&lt;/p&gt;

&lt;p&gt;Ans: James colleague George is going to attend a party in this city with Sarah. The party will be hosted by Pearce Rees.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;suntan&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;People love telling the world about their holiday, but is this really a great idea?&lt;br&gt;
What CITY is Sarah going on holiday to at the end of February?&lt;/p&gt;

&lt;p&gt;Ans : go to the likes section of James Profile, you will find Sarah. The Holiday picture is of Ferry Elizabeth Quay. The city name is the answer.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;wagthetail&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The team has been trying to work out where Person of Interest, Sarah, walks her dog. This is part of building up a profile of her movements.&lt;br&gt;
Can you have a look to see if you can find the TOWN in which Sarah tends to take the dog out to?&lt;/p&gt;

&lt;p&gt;Ans : In the bio there is Buster's favorite place. The google map will tell the place.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;narcissism &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;There's a new Person of Interest, George something or other.&lt;br&gt;
Can you find anything interesting on him? Something he perhaps thinks you can't work out?&lt;br&gt;
Take a look.&lt;/p&gt;

&lt;p&gt;Ans : decode aW1hbWF6aW5nMTIz using base64&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;proppedup &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We've obtained what we believe to be an office CCTV camera feed.&lt;br&gt;
We have reason to suspect that it is overlooking one of the work desks belonging to one of our targets.&lt;br&gt;
Can you confirm the COLOUR of the DESK SURFACE and the COLOUR of the DESK LEGS, just so we can be sure of what we're seeing and task the reconnaissance team further.&lt;br&gt;
Enter the flag as: (SURFACE COLOUR) (SPACE) (LEGS COLOUR)&lt;/p&gt;

&lt;p&gt;Ans : Pearce Rees twitted about the debit card left on the table&lt;br&gt;
(color of desk) (color of legs)&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;bluengreen &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;James has a habit of getting in the way of things ;).&lt;/p&gt;

&lt;p&gt;Ans : the clue is in the header_photo meaning the blue-green eyes&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;clockingout&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We're trying to plan when is best to break into James' house to plant a bug.&lt;br&gt;
What time does he start work? (UK time).&lt;/p&gt;

&lt;p&gt;Ans : Unsolved&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;meme&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We've been watching a bloke called George recently, you might have already done some work on him.&lt;br&gt;
He's not that smart by the looks of things, could be a good person to look for a social media presence on.&lt;br&gt;
In particular, we're after an access key for a program his company uses so that the team can ex-filtrate information to aid with our ongoing fraud investigations.&lt;/p&gt;

&lt;p&gt;Ans : The Access Code is in the meme&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;partytime&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Our intelligence analysts have reported that a whole bunch of our targets are having a party together on a Saturday night soon.&lt;br&gt;
We want to deploy agents to see whats going on, but we can't risk blowing our cover turning up in a car. The road is pretty quiet and the property has very clear view of its surroundings, our reports suggest.&lt;br&gt;
Find the location of the party and the best BUS ROUTE NUMBER to reach the party from Principality Stadium, Cardiff - where the surveillance team will be deployed from.&lt;br&gt;
This sounds silly but we need to blend in with the public. The stakes are high.&lt;br&gt;
Enter the BUS ROUTE NUMBER you think is best for this situation.&lt;/p&gt;

&lt;p&gt;Ans : look for the bus route number from Principality Stadium, Cardiff to 159 Llanedeyrn RdCardiffCF23 9DW . The answer will be one from (27, 95 and X1).&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;leaveamessage&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Our analysts have been trying to get proof of a target's phone number.&lt;br&gt;
We want to move ahead with the arrest but we must get evidence that the phone number we've got is indeed theirs. We need to be sure.&lt;br&gt;
Due to the highly sensitive nature of the case, we cannot confirm the target's name with you at this time.&lt;br&gt;
Please have a look to see if you can find their phone number.&lt;br&gt;
When you call the target's number what are the LAST THREE WORDS you hear (you can also just enter the phone number as your answer and that is fine as well)?&lt;/p&gt;

&lt;p&gt;Ans : Unsolved&lt;/p&gt;

</description>
      <category>cybersoc</category>
      <category>cyberdetectivectf</category>
      <category>ctf</category>
      <category>osintctf</category>
    </item>
    <item>
      <title>CRYPTOHACK Challenges</title>
      <dc:creator>zoey</dc:creator>
      <pubDate>Sat, 11 Sep 2021 17:42:54 +0000</pubDate>
      <link>https://dev.to/z0ey777/cryptohack-challenges-3286</link>
      <guid>https://dev.to/z0ey777/cryptohack-challenges-3286</guid>
      <description>&lt;p&gt;CRYPTOHACK is a free platform to learn and practice cryptography. The challenges are grouped into 9 sections, from introduction to misc.I enjoyed solving the problems.&lt;br&gt;
Link to the Website : &lt;a href="https://cryptohack.org/"&gt;https://cryptohack.org/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here's how I solve the Introduction section:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Finding Flags
Each challenge is designed to help introduce you to a new piece of cryptography. Solving a challenge will require you to find a "flag".&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;These flags will usually be in the format crypto{y0ur_f1rst_fl4g}. The flag format helps you verify that you found the correct solution.&lt;/p&gt;

&lt;p&gt;Try submitting this into the form below to solve your first challenge. &lt;/p&gt;

&lt;p&gt;Ans : The flag is available in the description  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Great Snakes
Modern cryptography involves code, and code involves coding. CryptoHack provides a good opportunity to sharpen your skills.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Of all modern programming languages, Python 3 stands out as ideal for quickly writing cryptographic scripts and attacks. For more information about why we think Python is so great for this, please see the FAQ.&lt;/p&gt;

&lt;p&gt;Run the attached Python script and it will output your flag.&lt;/p&gt;

&lt;p&gt;great_snakes.py&lt;/p&gt;

&lt;p&gt;Ans : Download the file and run it using python3 python-file.py&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Network Attacks
Several of the challenges are dynamic and require you to talk to our challenge servers over the network. This allows you to perform man-in-the-middle attacks on people trying to communicate, or directly attack a vulnerable service. To keep things consistent, our interactive servers always send and receive JSON objects.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Python makes such network communication easy with the telnetlib module. Conveniently, it's part of Python's standard library, so let's use it for now.&lt;/p&gt;

&lt;p&gt;For this challenge, connect to socket.cryptohack.org on port 11112. Send a JSON object with the key buy and value flag.&lt;/p&gt;

&lt;p&gt;The example script below contains the beginnings of a solution for you to modify, and you can reuse it for later challenges.&lt;/p&gt;

&lt;p&gt;Connect at nc socket.cryptohack.org 11112&lt;/p&gt;

&lt;p&gt;telnetlib_example.py&lt;/p&gt;

&lt;p&gt;Ans : In this challenge we need to replace the {"buy" : "clothes"} with {"buy" : "flag"} . Then run the python script using python3 python-file.py&lt;/p&gt;

</description>
      <category>cryptographychallenges</category>
    </item>
    <item>
      <title>My Documentation</title>
      <dc:creator>zoey</dc:creator>
      <pubDate>Sat, 11 Sep 2021 17:18:21 +0000</pubDate>
      <link>https://dev.to/z0ey777/my-documentation-8gb</link>
      <guid>https://dev.to/z0ey777/my-documentation-8gb</guid>
      <description>&lt;p&gt;Learning is a continuous process. It feel nice to look back to old papers and notes when you feel low . I will keep this as a reminder and hope someday someone will benefit from "My Documentation". &lt;br&gt;
Content -- Solved Challenges and analysis &lt;/p&gt;

</description>
      <category>computerscience</category>
      <category>devops</category>
      <category>analysis</category>
      <category>documentation</category>
    </item>
  </channel>
</rss>
