Capture the Flag Portfolio ๐ŸŽ„๐Ÿดโ€โ˜ ๏ธ

Welcome to my CTF portfolio! Here I showcase some of the cybersecurity challenges I've conquered and the creative solutions I devised. In particular, youโ€™ll find highlights from the SANS Holiday Hack Challenges in 2015 and 2014, where I earned special recognition for my solutions.

SANS Holiday Hack Challenge 2015 โ€“ โ€œGnome in Your Homeโ€

In 2015, I solved all the technical challenges of the Holiday Hack A Hackerโ€™s Holiday event, which earned me a Super Honorable Mention for creativity. I approached the challenges by thinking outside the box โ€“ for example, exploiting an IoT "Gnome" device and analyzing its network traffic in unexpected ways.

Interested in the detailed tech details? SANS Holiday Hack Tech Breakdowns

**Technical Breakdown (2015)** โ€“ *Click to expand*

๐Ÿงฉ Challenge Synopsis

An advanced adversary deployed surveillance Gnomes globally disguised as holiday decorations. These IoT devices captured images and exfiltrated them via DNS to covert Command & Control (C2) servers. My mission: identify, analyze, and exploit the vulnerabilities in five globally distributed "SuperGnome" servers and uncover the larger plot.


๐Ÿ› ๏ธ Key Techniques Used


๐Ÿง  Detailed Technical Findings

SG-01 โ€“ Ashburn, USA

SG-02 โ€“ Boardman, USA

SG-03 โ€“ Sydney, Australia

SG-04 โ€“ Tokyo, Japan

SG-05 โ€“ Sรฃo Paulo, Brazil


๐Ÿงจ History of Exploited Vulnerabilities


๐Ÿ›ก๏ธ Recommendations to Mitigate

  1. Credential Management

    • Enforce strong passwords
    • Never store passwords in plaintext
  2. Sanitize User Input

    • Use parameterized queries and safe serialization
    • Avoid eval() in any backend service
  3. Database Hardening

    • Require authentication
    • Implement role-based access controls
  4. Firmware Security

    • Encrypt sensitive files
    • Validate integrity pre-deployment
  5. Web Application Firewalls (WAF)

    • Deploy WAFs to mitigate injection and traversal attacks
  6. Exploit Mitigations

    • Properly implement ASLR, DEP, and stack canaries
    • Avoid static return addresses and hardcoded secrets
  7. DNS Monitoring

    • Watch for anomalous DNS activity suggesting tunneling
    • Log and alert on Base64 patterns in DNS queries
  8. Incident Response Readiness

    • Build playbooks for embedded device threats
    • Train staff in analyzing C2 traffic and reverse engineering binaries

๐Ÿ” โ€œUnless someone like you cares a whole awful lot, nothing is going to get better. Itโ€™s not.โ€ โ€“ Dr. Seuss

SANS Holiday Hack Challenge 2014 โ€“ Most Creative Winner

The 2014 challenge had a story centered around Charles Dickensโ€™ A Christmas Carol, with a cyber twist. I won the Most Creative Technical category for this competition by crafting an imaginative narrative-style report and solving challenges in unique ways.

Interested in the detailed tech details? SANS Holiday Hack Tech Breakdowns

**Technical & Creative Highlights (2014)** โ€“ *Click to expand*

๐Ÿงฉ Challenge Synopsis

In a time-traveling twist on cyber forensics, I was tasked with uncovering the event that changed Mr. Scrooge from a malicious hacker into a force for good. Guided by a mysterious specter and assisted by none other than Alan Turing, I investigated a series of USB artifacts and a legacy website to trace the evolution of Scroogeโ€™s ethical hacking journey.


๐Ÿ› ๏ธ Key Techniques Used


๐Ÿง  Detailed Technical Findings

๐Ÿ’พ USB Analysis

๐Ÿ” Secret #1: Your demise is a source of mirth

๐Ÿ” Secret #2: Your demise is a source of relief

    VVNCIFNlY3JldCAjMjogWW91ciBkZW1pc2UgaXMgYSBzb3VyY2Ugb2YgcmVsaWVmLg==

๐Ÿ” Secret #3: Your demise is a source of gain for others

๐Ÿ” Secret #4: Hack for good, not evil or greed


๐ŸŒ Website Analysis: www.scrooge-and-marley.com

๐ŸŒ Website Secret #1: Hacking can be noble

๐ŸŒ Website Secret #2: Use your skills for good

    Cookie: () { :;}; echo -e "\n\r" 123 && cd / && echo "$(</secret)"

๐Ÿค– Eliza Chatbot Secret


๐Ÿงจ History of Exploited Vulnerabilities


๐Ÿ›ก๏ธ Recommendations to Mitigate

  1. Secure File Metadata

    • Strip metadata from all public documents.
    • Monitor NTFS Alternate Data Streams.
  2. Patch Known Vulnerabilities

    • Implement immediate patching for Heartbleed, Shellshock, and similar critical CVEs.
  3. Sanitize Web Inputs

    • Validate and sanitize headers, cookies, and all client input.
    • Avoid dynamic evaluation of untrusted data.
  4. Deep Network Scanning

    • Donโ€™t rely solely on top ports; perform comprehensive scans regularly.
  5. Educate Ethical Hacking

    • Encourage story-driven, mission-based learning for new ethical hackers.
    • Promote โ€œhacking for goodโ€ values through immersive training.

๐Ÿ” โ€œHack for good, not for greed.โ€ โ€“ The Ghost of Hacking Yet to Come