Skip to content

grabitel1605/TAC-BOX

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

28 Commits
 
 
 
 
 
 
 
 

Repository files navigation

TAC-BOX [ToolKit]

This repo and guide will remain a open repo/document for continuous improvement, and will be used to assist with learning and competing in CTF challenges to improve our cyber skillset.

Tool Kit:

Operating System:

Parrot Security OS:

The Operating System we will be using for hacking/red teaming/pentesting is Parrot Security OS and can be downloaded at https://download.parrot.sh/parrot/iso/4.9.1/Parrot-security-4.9.1_x64.iso. The download link provides the standard .iso image that will be installed on your hypervisor (VirtualBox, VM Ware Player, VM Ware Workstation) of choice. Here are the System Requirements, and The installation process through the installer. Also, this walks you through Installing ParrotOS in Virtual Box and Installing ParrotOS in VMWare. There is a Parrot Security OVA (Open Virtual Appliance) virtual machine image. However, through personal experience this tends to be broken/built for a specific hypervisor. Once the .iso has been downloaded and installed on your hypervisor you will need to install either VirtualBox Guest Additions or open-vm-tools.

Installing VirtualBox Guest Additions on ParrotSecOS:

  1. On the Virtual Machine menu bar, select Devices > Insert Guest Additions CD image…
  2. Login as root by using sudo su, and enter your current user password
  3. Enter the CDROM directory by using cd /media/cdrom0/ (if there isn’t anything in this directory, open places > home, on the left side under devices click VBOX_GAs_#.#.#, close the window, then continue)
  4. Make a directory to move these files to with sudo mkdir /opt/vbox_ga
  5. Copy the Guest Additions file to “/opt/vbox_ga” directory with cp -r * /opt/vbox_ga
  6. Enter the “/opt/vbox_ga” directory with cd /opt/vbox_ga
  7. Give the permission for execute “+x” to “VBoxLinuxAdditions.run” by using sudo chmod +x VBoxLinuxAdditions.run
  8. Execute “VBoxLinuxAdditions.run” with sudo ./VBoxLinuxAdditions.run
  9. After installation completed, reboot the virtual machine with sudo reboot

Installing VMWare Open-VM-Tools on ParrotSecOS:

  1. sudo apt-get update
  2. sudo apt-get install open-vm-tools-desktop (if this throws an error use sudo apt-get install open-vm-tools)
  3. After installation completed, reboot the virtual machine with sudo reboot

SANS SIFT Workstation:

The Operating System we will be using for forensics is the SANS SIFT Worksation and can be downloaded at https://digital-forensics.sans.org/community/download-sift-kit/3.0. The download link provides the standard .ova image that will be imported on your hypervisor (VirtualBox, VM Ware Player, VM Ware Workstation) of choice.

Importing a .ova into VitrualBox:

  1. On the VirtualBox menu bar, select File > Import Appliance
  2. A new window will popup asking for the location of the .ova file.
  3. Click the folder/arrow icon on the right of the input box and select SIFT-Workstation.ova
  4. The next window will be “Appliance Settings”, change these to meet your needs.
  5. The click the “Import” button at the bottom right of the window.

Importing a .ova into VMWare:

  1. In Workstation Player, select File > Open a Virtual Machine.
  2. Browse to the .ova file and click Open.
  3. Type a name for the virtual machine, type or browse to the directory for the virtual machine files and click Import.
  4. If the import fails, click Retry to try again, or click Cancel to cancel the import.
  5. Once Imported click on the virtual machine name to open it.
  6. Then click “Edit virtual machine settings” and change these to meet your needs.

Once the .ova has been downloaded and imported into your hypervisor you will need to install either VirtualBox Guest Additions or open-vm-tools.

Installing VirtualBox Guest Additions on ParrotSecOS:

  1. On the Virtual Machine menu bar, select Devices > Insert Guest Additions CD image…
  2. Login as root by using sudo su, and enter your current user password
  3. Enter the CDROM directory by using cd /media/cdrom0/ (if there isn’t anything in this directory, open places > home, on the left side under devices click VBOX_GAs_#.#.#, close the window, then continue)
  4. Make a directory to move these files to with sudo mkdir /opt/vbox_ga
  5. Copy the Guest Additions file to “/opt/vbox_ga” directory with cp -r * /opt/vbox_ga
  6. Enter the “/opt/vbox_ga” directory with cd /opt/vbox_ga
  7. Give the permission for execute “+x” to “VBoxLinuxAdditions.run” by using sudo chmod +x VBoxLinuxAdditions.run
  8. Execute “VBoxLinuxAdditions.run” with sudo ./VBoxLinuxAdditions.run
  9. After installation completed, reboot the virtual machine with sudo reboot

Installing VMWare Open-VM-Tools on ParrotSecOS:

  1. sudo apt-get update
  2. sudo apt-get install open-vm-tools-desktop (if this throws an error use sudo apt-get install open-vm-tools)
  3. After installation completed, reboot the virtual machine with sudo reboot

Additional Tools:

LinEnum – BASH shell script for linux enumeration - https://github.com/rebootuser/LinEnum

PowerShell Empire - post-exploitation agent / C2 framework using powershell - https://www.powershellempire.com/

Skiptracer - CLI OSINT Tool (Gives you a place to start when you have very little information.) - https://github.com/xillwillx/skiptracer

OpenVAS – vulnerability scanner - https://www.ceos3c.com/hacking/install-openvas-parrotsec/

Nessus – Vulnerability Scanner (Free version but limited) - https://www.tenable.com/products/nessus/nessus-essentials

Veil-Evasion - Veil-Evasion is a tool designed to generate metasploit payloads that bypass common anti-virus solutions. - https://github.com/Veil-Framework/Veil-Evasion

Crack Station – online hash cracker that supports LM, NTLM, md2, md4, md5, md5(md5_hex), md5-half, sha1, sha224, sha256, sha384, sha512, ripeMD160, whirlpool, MySQL 4.1+ (sha1(sha1_bin)), QubesV3.1BackupDefaults (also pretty fast) - https://crackstation.net/

CyberChef – Open Source Data Analysis Tool - https://gchq.github.io/CyberChef/

CVE Details – vulnerability research (used for information gathering and assists with exploitation) - https://www.cvedetails.com/

ExploitDB / searchsploit - vulnerability research (can be installed on ParrotSecOS using sudo apt-get install exploitdb, syntax is searchsploit “search criteria”(used for information gathering and assists with exploitation)) - https://www.exploit-db.com/

Additional Resources:

Guides and Info:

CTF Cheat Sheet - https://raw.githubusercontent.com/175ME1/CTF-Guide/master/cheat%20sheets/CTF-CheatSheet?token=ANFE4SFYP2LQWBZEFQWSHZK66EEXY

Basic Dot Files - https://github.com/175ME1/CTF-Guide/tree/master/dotfiles

https://pequalsnp-team.github.io/cheatsheet/writing-good-writeup

https://ryankozak.com/how-i-do-my-ctf-writeups/

https://apsdehal.in/awesome-ctf/

https://ctfs.github.io/resources/

https://www.hoppersroppers.org/courseCTF.html

https://trailofbits.github.io/ctf/

https://github.com/zardus/ctf-tools

https://captf.com/practice-ctf/

https://www.reddit.com/r/securityCTF/

CTF Legend

URL | Abbreviation

https://tryhackme.com | (THM)

https://cryptohack.org/ | (CPH)

https://nationalcyberleague.org/ | (NCL)

https://picoctf.com/ | (pico)

https://www.hackthebox.eu/ | (HTB)

About

This repo and guide will remain a open repo/document for continuous improvement, and will be used to assist with learning and competing in CTF challenges to improve our cyber skillset.

Topics

Resources

Stars

Watchers

Forks

Packages

 
 
 

Contributors