[Owasp-leaders] CTF services

Ali Khalfan ali.khalfan at owasp.org
Thu Jul 14 21:41:59 UTC 2016


Thanks for the input 

On July 14, 2016 7:50:03 PM GMT+03:00, Ivan Buetler OWASP <ivan.buetler at owasp.org> wrote:
>Or use OWASP/Hacking-Lab
>
>https://www.owasp.org/index.php/OWASP_Hacking_Lab
>
>
>Ivan Buetler
>ivan.buetler at owasp.org
>
>
>
>
>On 14 Jul 2016, at 17:53, Jonathan Carter <jonathan.carter at owasp.org>
>wrote:
>
>Indeed. We ran Shepherd at my company as a CTF and it was a big
>success. We had about 120 engineers play it for about 3 hrs.  It was a
>huge success within the company. 
>
>On Jul 13, 2016, at 10:15 PM, Munir Njiru <munir.njiru at owasp.org>
>wrote:
>
>> OWASP Security Shepherd also can be setup offers some good runs for a
>CTF :) quite gamified. 
>> 
>> Munir Njenga,
>> OWASP Chapter Leader (Kenya) || Information Security Consultant ||
>Developer
>> Mob   (KE) +254 (0) 734960670
>> 
>> =============================
>> Chapter Page: www.owasp.org/index.php/Kenya
>> Project Site:       
>http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/
>> Email: munir.njiru at owasp.org
>> Facebook: https://www.facebook.com/OWASP.Kenya
>> Mailing List: https://lists.owasp.org/mailman/listinfo/owasp-Kenya
>> 
>> 
>> On Wed, Jul 13, 2016 at 11:31 PM, Ali Khalfan <ali.khalfan at owasp.org>
>wrote:
>> Thanks, Michael !
>> 
>> On July 13, 2016 11:29:03 PM GMT+03:00, Michael Born
><michael.born at owasp.org> wrote:
>> Hi Ali,
>> 
>> I'm happy to share the vulnerable VM I developed for Fred Donovan's
>and my Offensive Python class. There are a slew of application and host
>based vulnerabilities to beat up on. Feel free to use it and the Python
>scripts as you need. I designed the vulnerable VM to accommodate
>beginner to intermediate penetration testers. If you have questions,
>I'm happy to answer them! The download link to the VM and scripts is
>below:
>> 
>> https://drive.google.com/open?id=0B8UHsn2i5kmGTzhJSl9TNlJGcWM
>> 
>> Additionally, vulnhub (http://vulnhub.com) is a great place to
>download custom made vulnerable VM's developed by some smart people in
>the InfoSec community. VulnHub is not endorsed by OWASP by any means
>but I use them regularly to keep up on my skill set as a penetr ation
>tester.
>> 
>> Thank you,
>> 
>> Michael
>> 
>> Michael Born
>> OWASP Omaha
>> Michael.Born at OWASP.org
>> 
>> On Wed, Jul 13, 2016 at 11:50 AM, Ali Khalfan <ali.khalfan at owasp.org>
>wrote:
>> 
>> 
>> Does anyone know of any provider/site/company that offers CTF simply
>for
>> training and developing pen testing skills ?  I know the AppSec CTF
>is
>> reserved for conferences only and I'd like to recommend places where
>> would-be pen testers can keep their skills polished and be up to date
>> (not to mention test some OWASP endorsed products).
>> 
>> 
>> 
>> 
>> 
>> _______________________________________________
>> OWASP-Leaders mailing list
>> OWASP-Leaders at lists.owasp.org
>> https://lists.owasp.org/mailman/listinfo/owasp-leaders
>> 
>> 
>> 
>> -- 
>> Sent from my Android device with K-9 Mail. Please excuse my brevity.
>> 
>> _______________________________________________
>> OWASP-Leaders mailing list
>> OWASP-Leaders at lists.owasp.org
>> https://lists.owasp.org/mailman/listinfo/owasp-leaders
>> 
>> 
>> _______________________________________________
>> OWASP-Leaders mailing list
>> OWASP-Leaders at lists.owasp.org
>> https://lists.owasp.org/mailman/listinfo/owasp-leaders
>_______________________________________________
>OWASP-Leaders mailing list
>OWASP-Leaders at lists.owasp.org
>https://lists.owasp.org/mailman/listinfo/owasp-leaders
>
>_______________________________________________
>OWASP-Leaders mailing list
>OWASP-Leaders at lists.owasp.org
>https://lists.owasp.org/mailman/listinfo/owasp-leaders

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.owasp.org/pipermail/owasp-leaders/attachments/20160715/25f3b685/attachment-0001.html>


More information about the OWASP-Leaders mailing list