Learning Outcomes of the Class Test 1:
Learning Outcomes of the Class Test 1:
CLO1: Apply ethical hacking and digital forensics skills and techniques to attempt Capture The Flag (CTF) activities in a controlled environment (C3, PLO2)
Instructions
No marks will be awarded for the class test if any part of it is found to be copied directly from printed materials or from another student.
You are required the challenges and provide write-ups with screenshots to show the main steps how they are solved.
The steps in solving the challenges should be numbered.
The tools / commands / scripts used should be clearly screenshot and mentioned / documented.
Create a folder with your TP number (TPxxxxxx) to download all the related files needed. Your screenshots should clearly show the files being accessed from your TPxxxxxx folder.
For online platform CTFs, the final step should show the screenshot that the flags being submitted are correct.
For offline CTF challenges, retrieve the files from subfolder in Moodle. Offline CTF challenges are not associated with any online platforms. The final step should show the flag obtained.Question 1: Cryptography (30 marks)
Offline (the files should be retrieved from subfolder in Moodle):
Title: Something about multiVERSE and are you sure about BITCOIN?
File: no-way-home-2.png
Description: There is an encrypted text within the image that you need to decode.
Question 2a: Web Vulnerabilities (20 marks)
Platform: CTFLEARN
HYPERLINK "https://ctflearn.com/challenge/114" https://ctflearn.com/challenge/114
Title: POST Practice
Question 2b: Web Vulnerabilities (15 marks)
Platform: CTFLEARN
https://ctflearn.com/challenge/88Title: Basic Injection
Question 3: Reverse Engineering (35 marks)
https://skrctf.me/challenges
Additional 6 Reverse.py files included for practice.
Reverse1.py Reverse5.py
Learning Outcomes of the Class Test 2:
CLO1: Apply ethical hacking and digital forensics skills and techniques to attempt Capture The Flag (CTF) activities in a controlled environment (C3, PLO2)
Question 1: Binary Exploitation (35 marks)
http://pwnable.kr/play.phpSelect bof
Question 2: Computer Forensics (30 marks)
2a
2b
2c
Question 3: Network Forensics (35 marks)
https://play.picoctf.org/practice/challenge/115?category=4&page=1
https://play.picoctf.org/practice/challenge/30?category=4&page=2
Marking Rubrics
Fail Pass Credit Distinction
PLO2 Cognitive skills Fail to apply skill / knowledge to a
range of approaches
in the field of
study / work / practice. Average skills to apply skill /
knowledge to a
range of approaches
in the field of
study / work / practice. Good skills to apply skill /
knowledge to a
range of approaches
in the field of
study / work / practice. Excellent skills to apply skill /
knowledge to a
range of approaches
in the field of
study / work / practice.
Q1 (35 marks) Incorrect answer, no write-up provided, no demonstration of applying skills / knowledge. Partially answered, brief write-up provided, minimal demonstration of applying skills / knowledge. Correct answer with acceptable details, acceptable write-up provided to demonstrate skills / knowledge applied. Correct answer with excellent details, detailed write-up provided to demonstrate skills / knowledge applied.
Q2 (30 marks) Incorrect answer, no write-up provided, no demonstration of applying skills / knowledge. Partially answered, brief write-up provided, minimal demonstration of applying skills / knowledge. Correct answer with acceptable details, acceptable write-up provided to demonstrate skills / knowledge applied. Correct answer with excellent details, detailed write-up provided to demonstrate skills / knowledge applied.
Q3 (35 marks) Incorrect answer, no write-up provided, no demonstration of applying skills / knowledge. Partially answered, brief write-up provided, minimal demonstration of applying skills / knowledge. Correct answer with acceptable details, acceptable write-up provided to demonstrate skills / knowledge applied. Correct answer with excellent details, detailed write-up provided to demonstrate skills / knowledge applied.