Skip to content

An uncurated list and references to popular open source cybersecurity and network analysis tools. I rely heavily on these for teaching or instructing, and online CTF competitions.

Notifications You must be signed in to change notification settings

nix-xin/ctf_tools

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 

Repository files navigation

ctf_tools

An uncurated list and references to popular open source cybersecurity and network analysis tools. I rely heavily on these for teaching or instructing, and online CTF competitions.

Popular Cryptography Sites

These sites are helpful in encoding and decoding various ciphers. Boxentriq is pretty good at analyzing ciphers if you're not quite sure what it is.

Range Of Tools

Log Analysis

Analyzing logs can be a very tedious task, especially, when you're dealing with thousands of events in a single log. Below is a compilation of useful Linux command line tools that can help you parse out exactly what you're looking for.

Note: The idea is to first review the format of the log so you understand the various fields in each line. Most logs can be unique and custom to an application. For example, a Web Server log will most likely look different than a DNS log. So, pay attention to the delimeter that seperates each field. Sometimes, a space or tab can be the delimeter, but will not necessarily seperate each field perfectly. These utilities can be super helpful, but its always best to try a different combination of the commands to verify your output.

As our first example I will use the popular Apache web server. A typical log entry looks like the following: To understand the Apache Common format, take a look at this reference document: https://httpd.apache.org/docs/2.4/logs.html

192.168.200.3 - frank [10/Oct/2000:13:55:36 -0700] "GET /apache_pb.gif HTTP/1.0" 200 2326 "http://www.example.com/start.html" "Mozilla/4.08 [en] (Win98; I ;Nav)"
  • Looking for unique IP addresses that made requests to the server?
$ awk '{print $1}' access.log | sort | uniq -c | wc -l

About

An uncurated list and references to popular open source cybersecurity and network analysis tools. I rely heavily on these for teaching or instructing, and online CTF competitions.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published