[Owasp-leaders] CTF services

Ivan Buetler OWASP ivan.buetler at owasp.org
Sun Jul 17 17:16:48 UTC 2016


Sorry for my late reply (I am on holiday)

OWASP volunteers are grading your submissions, once you solved the OWASP challenges in Hacking-Lab. 
This is how it works
Human being will give feedback about your performance.
Regards
Ivan

Ivan Buetler
ivan.buetler at owasp.org



On 14 Jul 2016, at 23:41, Ali Khalfan <ali.khalfan at owasp.org> wrote:

Thanks for the input 

On July 14, 2016 7:50:03 PM GMT+03:00, Ivan Buetler OWASP <ivan.buetler at owasp.org> wrote:
Or use OWASP/Hacking-Lab

https://www.owasp.org/index.php/OWASP_Hacking_Lab


Ivan Buetler
ivan.buetler at owasp.org




On 14 Jul 2016, at 17:53, Jonathan Carter <jonathan.carter at owasp.org> wrote:

Indeed. We ran Shepherd at my company as a CTF and it was a big success. We had about 120 engineers play it for about 3 hrs.  It was a huge success within the company. 

On Jul 13, 2016, at 10:15 PM, Munir Njiru <munir.njiru at owasp.org> wrote:

 OWASP Security Shepherd also can be setup offers some good runs for a CTF :) quite gamified. 
 
 Munir Njenga,
 OWASP Chapter Leader (Kenya) || Information Security Consultant || Developer
 Mob   (KE) +254 (0) 734960670
 

=============================

 Chapter Page: www.owasp.org/index.php/Kenya
 Project Site:        http://alienwithin.github.io/OWASP-mth3l3m3nt-framework/
 Email: munir.njiru at owasp.org
 Facebook: https://www.facebook.com/OWASP.Kenya
 Mailing List: https://lists.owasp.org/mailman/listinfo/owasp-Kenya
 
 
 On Wed, Jul 13, 2016 at 11:31 PM, Ali Khalfan <ali.khalfan at owasp.org> wrote:
 Thanks, Michael !
 
 On July 13, 2016 11:29:03 PM GMT+03:00, Michael Born <michael.born at owasp.org> wrote:
 Hi Ali,
 
 I'm happy to share the vulnerable VM I developed for Fred Donovan's and my Offensive Python class. There are a slew of application and host based vulnerabilities to bea
 t up
on. Feel free to use it and the Python scripts as you need. I designed the vulnerable VM to accommodate beginner to intermediate penetration testers. If you have questions, I'm happy to answer them! The download link to the VM and scripts is below:

 
 https://drive.google.com/open?id=0B8UHsn2i5kmGTzhJSl9TNlJGcWM
 
 Additionally, vulnhub (http://vulnhub.com) is a great place to download custom made vulnerable VM's developed by some smart people in the InfoSec community. VulnHub is not endorsed by OWASP by any means but I use them regularly to keep up on my skill set as a penetr ation tester.
 
 Thank you,
 
 Michael
 
 Michael Born
 OWASP Omaha
 Michael.Born at OWASP.org
 
 On Wed, Jul 13, 2016 at 11:50 AM, Ali Khalfan <ali.khalfan at owasp.org> wrote:
 
 
 Does anyone know of any
provider/site/company that offers CTF simply for

 training and developing pen testing skills ?  I know the AppSec CTF is
 reserved for conferences only and I'd like to recommend places where
 would-be pen testers can keep their skills polished and be up to date
 (not to mention test some OWASP endorsed products).
 
 
 
 
 

 OWASP-Leaders mailing list
 OWASP-Leaders at lists.owasp.org
 https://lists.owasp.org/mailman/listinfo/owasp-leaders
 
 
 
 -- 
 Sent from my Android device with K-9 Mail. Please excuse my brevity.
 

 OWASP-Leaders mailing list
 OWASP-Leaders at lists.owasp.org
 https://lists.owasp.org/mailman/listinfo/owasp-leaders
 
 

 OWASP-Leaders mailing list

OWASP-Leaders at lists.owasp.org

 https://lists.owasp.org/mailman/listinfo/owasp-leaders

OWASP-Leaders mailing list
OWASP-Leaders at lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-leaders


OWASP-Leaders mailing list
OWASP-Leaders at lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-leaders

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.
_______________________________________________
OWASP-Leaders mailing list
OWASP-Leaders at lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-leaders



More information about the OWASP-Leaders mailing list