DEFCON DOMINATION: The Ultimate CTF Cheat Sheet
Capture SS7 traffic on SIGTRAN (SCTP)
Get current location via SS7
Real-time location & subscriber state
Redirect MT-SMS to attacker
Manipulate CAMEL profile
Build your own SS7 node
Check if operator exposes SCTP port
Replay captured MAP messages
Get subscriber data via Diameter
Look for suspicious OTA SMS
Successor to many old tools
Force HLR to update victim location to attacker-controlled VLR
Remove subscriber profile from VLR → instant service outage
Get MSRN to reroute calls through attacker MSC
Request auth vectors → potential ki exposure on weak networks
Request auth vectors over Diameter (4G/5G equivalent)
Exploit SCTP multi-homing to inject/associate with existing association
Flood HLR with UpdateLocation requests → overload
Send SMS directly bypassing home SMSC
More stealthy than standard UpdateLocation; forces SGSN to report victim to attacker-controlled GGSN
Chain CancelLocation → PurgeMS to force immediate detach and prevent re-registration for minutes/hours
Classic two-step: ATI for location → MT-ForwardSM to silently intercept OTPs/banking SMS
Inject malicious SCF (Service Control Function) → all calls/SMS forwarded to attacker without victim notice
Request full subscriber profile (including APN, keys, location) from HSS over Diameter
SRI-SM to get IMSI routing → MT-ForwardSM direct delivery bypassing home SMSC filtering
Push malicious subscriber data (e.g. change AMF/SCF) into HSS → persistent call/SMS reroute
Flood with class-0 (flash) SMS → phone constantly shows popup → user can't use device
List commands user can run as root.
Map IP to hostname for convenience.
Access remote NFS directories.
Quickly serve files from current directory.
Set correct permissions for SSH private key.
Connect using a private key.
Find ways to bypass restricted shells.
Create a Linux password hash for /etc/passwd.
Understand the password file structure.
Sudo vulnerability for root access.
Key online resources for password lists.
Common local wordlist directory.
Extract data when no error messages are returned.
Access internal network resources via vulnerable server.
Craft malicious serialized objects for RCE.
Execute code in server-side templates.
Bypass WAFs by splitting parameters.
Read local files or perform SSRF via XML parsing.
Find hidden directories and files.
Common SQLi payloads.
Send POST data to a web server.
Common Drupal paths for enumeration.
Understand common HTTP response codes.
Access developer tools for web debugging.
Get contents of PHP files in base64 without execution.
Simple PHP code for command execution.
Automated SQL injection and database takeover tool.
Fuzz a range of IDs/port numbers.
Call libc functions without shellcode.
Exploiting freed memory chunks.
Automated bug discovery via mutation-based fuzzing.
Execute shell with a single gadget in libc.
Write arbitrary values to memory addresses.
Complex Return-Oriented Programming chain.
Find exact offset to EIP override.
Check binary security features.
Bypass common anti-debugging checks.
Hook functions and modify runtime behavior.
Modify binary instructions directly.
Unpack common executable packers.
Demangle C++ symbols for readability.
Identify executed code paths during analysis.
Find readable strings in a binary.
Determine the file type and architecture.
Disassemble sections of an executable.
Trace library calls or system calls.
Open and analyze a binary with Radare2.
Use a decompiler for high-level code view.
Decrypt CBC-mode ciphertext by observing padding errors.
Factor large numbers for RSA key recovery.
Infer secret data from execution time differences.
Post-quantum cryptography, often involves LWE/SIS problems.
Core problem in ECC, often targeted in CTFs.
Perform computations on encrypted data.
Common encoding/decoding operations.
Convert between hexadecimal and ASCII.
Simple Caesar cipher brute-force.
Identify hash types for cracking.
XOR two byte strings.
Crack hashes using wordlists.
Crack NT hashes with rules.
Brute-force SSH login.
Brute-force web login forms.
Brute-force password-protected zip archives.
Bash script to brute-force OpenSSL encrypted files.
Crack SHA256 hashes with username.
Generate custom wordlists with specific patterns.
Use Burp Suite Intruder for HTTP Basic Auth.