skip to main | skip to sidebar

Sweet Hack: Fraktil's Infosec Blog

Friday, January 1, 2010

Hacking Practice: Purposely Vulnerable Software

Vulnerable VMware/VirtualBox images from past CTF competitions:
Link
http://ctf.hcesperer.org/25c3ctf
http://ctf.hcesperer.org/daopen08
http://ctf.hcesperer.org/eh08ctf
http://ictf.cs.ucsb.edu/images.php
http://lampsecurity.org/capture-the-flag-5 (currently down)
http://lampsecurity.org/capture-the-flag-6 (currently down)

Many more resources: Damn Vulnerable Web App, Damn Vulnerable Linux (download), OWASP's WebGoat, De-ICE, IronGeek's Mutillidae, Bonsai's Moth, and Foundstone's HacMe Video Series.

I am currently going through these myself.
Posted by fraktil at 10:32 AM
Labels: ctf, de-ice, dvl, hacking, ictf, irongeek, moth, owasp, webgoat

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Blog Archive

  • ▼  2010 (8)
    • ▼  January (8)
      • "TechCrunch Hacked" Hacked! (Pwned welcome banner)
      • Technology Shouldn't Give Big Brother a Head Start
      • Links Links Links!
      • How to find vulnerabilities, write shellcode, expl...
      • The Web Application Security Consortium / Web Appl...
      • Hacking Practice: Purposely Vulnerable Software
      • SQL Injection Resources
      • Why You Should Come Back

About Me

My photo
fraktil
View my complete profile