[Pratik]:As the scope of bug bounty has increased in India and also the CTFs, In India only few people plays CTF.
Tell me something about CTFs and what are it's benefit related to Job or bug bounty
[Aaditya]: I did bug bounty for around 2 years, until 2015.
Then I left Bug Bounty. I did full focus on CTFs
Why I left Bug Bounty, this is my point of view
I thought that if I fuzz the whole day, then my enumeration skills will get perfect.
Like how many services a target has, and also can find a bug and may also exploit it and can demonstrate the exploitibility
But it takes a lot of time. Like you find bug, then you get bounty.
But, in cyber security there are lots of field not only web
You should have knowledge of Mobile, RE, Binary, Cryptography
If you only do bug bounty, then you will only keep doing bug bounty in your whole life.
When I thought, I reached my threshold of learning in bug bounty. I started CTFs
CTF is capture the flag, like in bug bounty there are real websites. CTF sites are built by the organizers of the CTF
They are intentionally vulnerable. Like they ask you to hack it
If you hack it using intended techniques, then you will get a flag. Flag is like a string like You solved it flag{...}
and after validating you receive points
There are different categories, then you should focus on category in which you have interest
There are challenges of different points. 100 pt for instance is easier than 500 pt ones
There are 3 types of CTFs generally
1st is jeopardy, which is category based which is most common
If you are interested in CTF, look at ctftime.org which has calender for CTFs
Second thing, is Attack-Defense. In AD all teams have different services. Team A will attack Team B's service
Whereas Team B will attack Team A service and you also have to patch them.
You have to constantly play it, they are around 7 hours to 24 hours maximum
Third is King of the Hill, in which you maintain persistence in the servers.
It is not much, but big ctfs like defcon and all has
You learn a lots from CTFs
[Pratik]: Basic knowledge for someone who wants to start CTFs?
[Aaditya]: First of all, general answer is it depends on your field. If you are targetting cryptography, then your skills related to web
will be useful but not to that much extent. For that, you need to understand maths, having grip on algorithms, programming with python
C, C++ is also a bonus
In recent CTF, there was a go based binary
google's language, less folks do it. That could be learned during ctf duration
It depends on your catching strength.
CTF will push you out of your comfort zone. Like daily stuff you perform like capturing requests from Burp Suite, using tools
Sublisters and all. Script kiddie style enumeration.
In CTFs, you write your own code exploit. So, python skills is like bonus. Mandatory thing
[Pratik]: To write pwntools exploit, bash scripting should also be good.
[Aaditya]: You need good hold of Linux, if you are going towards ELF side and windows hold is a plus point.
Regarding the tools, the tool you use in real world are also applicable to CTFs like Burp Suite for proxying
You can use wireshark to analyze network traffics.
Toolset is the same
[Pratik]: Any CTFs for beginner, websites? Can you share in link?
[Aaditya]: The best CTF for beginner is PicoCTF
It is hosted by CMU every year, targeted to High school students.
and newbies. Challenges are easy and gradually increase in difficulty. That's a good thing to try.
The challenges are online. You can read writeups on that.
So you can easily learn.
[Pratik]: Required programming language for Bug Bounty and CTFs? Because I get a lot of message on Youtube and Instagram
like what languages I need to learn hacking we should focus?
[Aaditya]: Javascript, can be used to strengthen your client side exploitation skill.
Second thing, is learning automation using Python. Python is quick to write.
If I want to write a POC code, I will do that in Python
It has rich libraries
PHP is also good, PHP also has bugs.
Recently there was Real World CTF, in that PHP internals bug were present
Like you can do SegFault in PHP and can perform RCE.
C, C++ is evergreen. That you should always know.
Java, is needed to go into Android (Mobile) field.
These 5-6 languages are like must learn.
So, it's C, C++, Java, Python, Shell scripting and whole LAMP stack
[Pratik]: What is importance of networking in Hacking?
[Aaditya]: You should know networking concept along with Linux fu.
If you are using any public computer, then would you open your facebook a/c at first.
You need to check what process are running on that machine, what ports are open
Like is there any port in which reverse shell communication is happening
netstat, route, arp etc should be known and learnt
There is also a site overthewire, in which there are networking challenges. If you finish that trick, you will get an idea
What services are running on what protocol will be understood by networking, what traffic is generated
When you press ping on terminal, it generates ICMP request.
Like now what if you want to breakdown ICMP protocol, then you can open wireshark, start capturing request
and write ping command. Then you can read the entries there
You can disassemble that network traffic in Wireshark.
If you are doing pentesting, then networking is important.
Like in red teaming, how do you exfiltrate data like if many protocols are blocked or commands are restrictive.
like firewall, then how you could bypass it.
[Pratik]: Some people says if you have laptop worth $1000 then only you can do good pentesting. Can you debunk that?
If you see these two laptops:Macbook and Dell, he earned from his own earning in US.
and these are also pretty old laptop.
So, it's not needed that you can do pentesting on only costly machine. Only in initial stages, you may need
like programming, automation, GPU cracking
[Aaditya]: You can also SSH into your VPS. You can download XShell or Putty
And purchase $5 basic VPS from Digital Ocean.
It should be even better than your lowly runned VM
Good RAM, good space, and linux server. From scratch deployment.
You can SSH to it even from Windows box like put the remote IP and port number
and login with password or public key.
and then you enter the linux box. So that's a good option that you gotta enumerate




Không có nhận xét nào:
Đăng nhận xét