Recommended Setup
We recommend you set up a Kali linux virtual machine to do CTF challenges in as
kali has most of the tools you will need already installed. To set this up follow
these steps:
- Download and install VirtualBox
- Download the Kali Linux OVA
- Torrenting this may speed up your download; to download a torrent you need a bittorrent client. Qbittorrent or Transmission are good free bittorrent clients.
- Open VirtualBox
- Press the “import” button in the top bar
- In the popup select the downloaded Kali Linux OVA file
- Press continue and agree to the terms
- Press start to launch your VM
- The default login credentials are username:
kali password: kali
Presentations
Presentations 2022
| No |
Topic |
Date |
Files |
| |
SQLi + Command Injection |
01/03/23 |
pdf |
| 14 |
Linux |
15/02/23 |
pdf |
| 10 |
Steganography |
30/11/22 |
pdf |
| 8 |
Cross-Site Scripting |
16/11/22 |
pdf |
| 4 |
Privilege Escalation |
19/10/22 |
pdf |
| 3 |
Command Injection |
12/10/22 |
pdf |
| 1 |
Welcome session |
28/09/22 |
pdf |
Presentations 2021
| No |
Topic |
Date |
Files |
| 14 |
Big Hak Preppers |
16/03/22 |
pdf |
| 13 |
Reverse engineering + Cracking |
02/03/22 |
pdf demo files |
| 12 |
Wireless Attacks |
16/02/22 |
pdf |
| 11 |
Binary Exploitation |
09/02/22 |
pdf demo files |
| 10 |
Log4Shell |
02/02/22 |
pdf |
| 9 |
Memory Forensics |
01/12/21 |
pdf |
| 8 |
CTF things |
17/11/21 |
pdf |
| 7 |
Digital forensics |
10/11/21 |
pdf |
| 6 |
LFI + SSTI + SSRF + Prototype pollution |
03/11/21 |
pdf |
| 5 |
Password authentication and best practices |
27/10/21 |
pdf |
| 4 |
Linux essentials + PrivEsc |
20/10/21 |
pdf |
| 3 |
SQLi + XSS |
13/10/21 |
pdf |
| 2 |
Kali Setup + Command Injection |
06/10/21 |
pdf |
| 1 |
OSINT + Crypto |
29/09/21 |
pdf |
Presentations 2020
Presentations 2019
| Topic |
Date |
Powerpoint |
Pdf |
| Fresher’s session |
25/09/19 |
pptx |
pdf |
| Web exploitation |
02/10/19 |
pptx |
pdf |
| Networking and Forensics |
09/10/19 |
pptx |
pdf |
| Reverse Engineering |
16/10/19 |
pptx |
pdf |
| CTF Fundamentals |
23/10/19 |
pptx |
pdf |
Learning resources
InfoSec youtubers
Vulnerable boxes / CTFs