Install Tailscale by following the installation instructions provided on the Tailscale website for your OS.
Open your command line interface (CLI) or terminal on your computer.
Check if Tailscale is installed successfully by typing the following command and pressing Enter:
1
tailscale
If the installation is successful, proceed to connect to Tailscale using the following command:
1
tailscale up --login-server http://3.111.220.12/ --authkey c37caddfa0e7cc2a3c0c0971b5777631df3fadce197586c6
Replace http://3.111.220.12/ with the actual login server address and c37caddfa0e7cc2a3c0c0971b5777631df3fadce197586c6 with your authentic key.
If the connection is successful, you will be able to interact with the challenges on eectf. Verify the connection by attempting to access the specified challenges.
If you encounter any problems during the process, please contact your nearby coordinator for assistance.
Congratulations! You are now ready to participate in the challenges. Happy hacking!
For MAC users only
Open Security & Privacy:
In the System Preferences window, click on “Security & Privacy.” Unlock to Make Changes:
If the padlock icon in the bottom-left corner is locked, click on it and enter your administrator password to unlock it. Allow the App to Open:
In the “General” tab of the Security & Privacy preferences, you will see information about the blocked application.
Click on the “Open Anyway” button next to the message about the blocked application.
A new dialog will appear, asking if you’re sure you want to open the application. Click “Open.” Confirm Opening:
If prompted again, confirm that you want to open the application. Open the Application:
The application should now open without any issues.
Join us for the much-anticipated Capture the Flag (CTF) event, Republic of Cyber Sentinels (RCSCTF24), meticulously organized by EncryptEdge. Set in the vibrant atmosphere of the LPU Campus, this offline event is scheduled for the 26th and 27th of January 2024.
Duration: 26th January - 27th January 2024 (24 hours)
Event Type: Offline
Organizing Team: EncryptEdge
Location: LPU Campus
Team Size: Max 4 members
Invitations
Students from universities all around India and working professionals are cordially invited to participate in this dynamic event.
Event Passes
Campus Student Pass: ₹250 INR
Standard Pass: ₹350 INR
Standard Pass: ₹500 INR
Event Highlights
Dynamic Challenges: RCSCTF24 will feature multiple challenges, each rooted in real-life scenarios, offering a highly immersive and practical experience.
24-Hour Marathon: The event spans a full 24 hours, packed with continuous engagement and excitement.
Food and Refreshments: Delicious food will be provided, keeping the energy high throughout the event.
Interactive Sessions and Quizzes: Beyond the CTF, the event includes interactive sessions from speakers, quizzes, and other fun activities, ensuring a well-rounded and enriching experience.
Networking Opportunities: Meet and connect with fellow cybersecurity enthusiasts and professionals.
Join us for the much-anticipated Capture the Flag (CTF) event, Republic of Cyber Sentinels (RCSCTF24), meticulously organized by EncryptEdge. Set in the vibrant atmosphere of the LPU Campus, this offline event is scheduled for the 26th and 27th of January 2024.
Duration: 26th January - 27th January 2024 (24 hours)
Event Type: Offline
Organizing Team: EncryptEdge
Location: LPU Campus
Team Size: Max 4 members
Invitations
Students from Universities all around India and LPU students are cordially invited to participate in this dynamic event.
Event Passes
Campus Student Pass: ₹250 INR
Standard Pass: ₹350 INR
Standard Pass: ₹500 INR
Event Highlights
Dynamic Challenges: RCSCTF24 will feature 5 challenges, each rooted in real-life scenarios, offering a highly immersive and practical experience.
Geo-Tagging / Geocaching Challenge: Adding a unique twist, the event includes an exciting Geo-tagging / Geocaching type challenge, encouraging outdoor exploration and problem-solving.
24-Hour Marathon: The event spans a full 24 hours, packed with continuous engagement and excitement.
Food and Refreshments: Delicious food will be provided, keeping the energy high throughout the event.
Interactive Sessions and Quizzes: Beyond the CTF, the event includes interactive sessions from speakers, quizzes, and other fun activities, ensuring a well-rounded and enriching experience.
Networking Opportunities: Meet and connect with fellow cybersecurity enthusiasts and professionals.
Step 1 - Pre attack preparation : So as you know Hacking without permission is illegal. So lets be anonymous before hacking into the network. As you know in LAN networks devices gets identified by its MAC address
MAC address stands for Media Access Control address. It is a unique identifier assigned to each network adapter or network interface card (NIC) by the manufacturer. MAC addresses are 48-bit hexadecimal numbers, typically represented in colon separated pairs (e.g., 00:0C:29:9A:1B:1D). It is also known as Physical address we can not change the MAC address because it is physically attached with our NIC but using some methods or hack-tricks we can spoof the MAC . Here we will use ifconfig utility to spoof the MAC else we can try for automatic MAC changer software’s as well
Here I have used ifconfig ens33 down to stop the interface, then I used command ifconfig ens33 hw ether 00:11:22:33:44:55 which is spoofing my original MAC with Provided fake MAC in the command. Then simply used ifconfig ens33 up to again start the services.
LinEnum : Simple Bash Script that performs common commands related to privilege escalation & enumertaes the user privileges
LinPeas : LinPEAS is a script that search for possible paths to escalate privileges on Linux/Unix*/MacOS hosts. The checks are explained on book.hacktricks.xyz
Nmap (Network Mapper) is an open-source tool used for network discovery and security auditing. It’s a powerful and utility that helps users scan and map networks to find hosts, services, open ports, and more.
This is cheat sheet for nmap commands.
Penetration testing distros like Kali and Parrot os has nmap tool preinstalled. But if you are using any other linux distro, then run the below command according to the distro to install nmap:
For Debian/Ubuntu:
1
sudo apt-get install nmap
For Fedora:
1
sudo dnf install nmap
For Arch Linux:
1
sudo pacman -S nmap
Note: In all the below command “10.10.0.1” is used as target. Change it according to your target.