We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Hack the Puffy

Formal Metadata

Title
Hack the Puffy
Subtitle
OpenBSD advocacy through CTF
Title of Series
Number of Parts
34
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
A story about building a capture-the-flag (CTF) penetration testing challenge using OpenBSD for the Hack The Box platform, where most of the challenges are either based on Linux or Windows. Hack The Box is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with other members of similar interests. It contains several challenges that are constantly updated. Some of them simulating real world scenarios and some of them leaning more towards a CTF style of challenge. After joining Hack The Box and completing several challenges, I noticed some technologies missing or underrepresented among the challenges available. In this talk, I will go over the process of developing a CTF challenge, the learning objectives for participants, what went well, what did not go well, and the virtues of OpenBSD as an OS for a CTF challenge. I will also walk through the challenge itself, what I learned building it, share feedback, and identify other OpenBSD features for future challenges.