Skip to content

joembolinas/ethicalHacking-weeklyCTF

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

28 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ” MO-IT143 Ethical Hacking Snippets Collection

A comprehensive collection of ethical hacking tools, CTF challenges, and cybersecurity utilities developed for the MO-IT143 course. This repository contains practical implementations of various security analysis tools including file readers, regex extractors, log analyzers, web parsers, cryptographic tools, and flag decoders.

πŸ“ Project Structure

MO-IT143_Ethical_hacking_snippets/
β”œβ”€β”€ README.md                    # This documentation
β”œβ”€β”€ requirements.txt             # Python dependencies
β”œβ”€β”€ env/                        # Virtual environment
β”œβ”€β”€ angie/                      # Additional utilities
β”‚   β”œβ”€β”€ html_web_parser.py
β”‚   └── web_parser_app.py
β”œβ”€β”€ main/                       # Main application files
β”œβ”€β”€ WEEK-1/                     # File handling and text analysis
β”‚   β”œβ”€β”€ CTF-W1_mystery_text_file.txt
β”‚   └── fileReader.py
β”œβ”€β”€ WEEK-2/                     # Regular expressions and pattern matching
β”‚   β”œβ”€β”€ file_handling_app.py
β”‚   β”œβ”€β”€ Regex_Info_Extractor.ipynb
β”‚   └── regexExtractor.py
β”œβ”€β”€ WEEK-3/                     # Log analysis and forensics
β”‚   β”œβ”€β”€ CTF-W3_expanded_access_logs.txt
β”‚   β”œβ”€β”€ log_analysis_tool.ipynb
β”‚   └── W3-reflection.md
β”œβ”€β”€ WEEK-4/                     # Web scraping and SQL injection testing
β”‚   β”œβ”€β”€ html_web_parser.py
β”‚   β”œβ”€β”€ sql_injection_tester.py
β”‚   β”œβ”€β”€ W4-reflection.md
β”‚   └── web_parser_app.py
β”œβ”€β”€ WEEK-5&6/                   # Cryptography and password security
β”‚   β”œβ”€β”€ CTF-W5-Milestone1_large_hashed_passwords.txt
β”‚   β”œβ”€β”€ CTF-W5-Milestone1_large_wordlist.txt
β”‚   β”œβ”€β”€ encoder-decoder.py
β”‚   β”œβ”€β”€ Hashing_Passwords.py
β”‚   β”œβ”€β”€ milestone1_cryptic_vault.py
β”‚   β”œβ”€β”€ W5_Practice_Activity_No1-Secret_Message_Encoder.md
β”‚   └── W5_Practice_Activity_No2-Hashing_Passwords_with_SHA-256.md
β”œβ”€β”€ WEEK-7/                     # Advanced flag decoding and forensics
β”‚   β”œβ”€β”€ CTF-W7_large_leaked_transactions.csv
β”‚   β”œβ”€β”€ MO-IT143_Week7_CTF_The_Hidden_Code_BSIT-S3101.py
β”‚   └── W7-reflections.md
β”œβ”€β”€ WEEK-8/                     # Web traffic analysis and HAR file forensics
β”‚   β”œβ”€β”€ CTF-W8_large_captured_web_traffic.har
β”‚   β”œβ”€β”€ PythonPoweredHARAnalysis.py
β”‚   β”œβ”€β”€ ctf_har_flag_extractor.py
β”‚   β”œβ”€β”€ packetSniffingTool.py
β”‚   └── w8.md
└── WEEK-9&10/                  # GUI debugging and code analysis
    └── CTF-W9-Milestone 2.py

πŸš€ Quick Start

1. Environment Setup

Open VS Code in the project folder:

  • Open VS Code
  • Go to File > Open Folder... and select MO-IT143_Ethical_Hacking_Snippets

Open a new terminal in VS Code:

  • Go to Terminal > New Terminal
  • The terminal should open in your project folder

Activate the virtual environment:

  • Windows (cmd):
    env\Scripts\activate
  • Windows (PowerShell):
    .\env\Scripts\Activate.ps1
  • Git Bash or WSL:
    source env/Scripts/activate

Install required packages:

pip install -r requirements.txt

2. Running Applications

🌐 CTF Week 8: HAR Traffic Analyzer (Latest)

Web traffic analysis and network forensics tool

cd WEEK-8
python PythonPoweredHARAnalysis.py

Features:

  • πŸ” HAR File Analysis: Parse and analyze HTTP Archive files with 15,000+ requests
  • πŸ” Session Token Extraction: Extract authentication tokens from API responses
  • 🎯 Flag Detection: Search for CTF flags hidden in network traffic
  • πŸ“Š Data Visualization: Charts and statistics for traffic patterns
  • 🎨 Tabbed GUI Interface: Professional multi-tab interface for different analysis views
  • πŸ“ˆ Request Replay: Replay network requests for testing

Use Cases:

  • Digital forensics investigation
  • API security analysis
  • Session token extraction
  • Network traffic pattern analysis

πŸ” CTF Week 7: Flag Decoder

Advanced flag detection and decoding tool for CTF challenges

cd WEEK-7
python "MO-IT143 Week7 CTF_The Hidden Code BSIT-S3101.py"

Features:

  • 🎯 Multi-format Detection: Automatically detects Base64 and hexadecimal encoding
  • πŸ† Smart Flag Recognition: Searches for common CTF flag patterns
  • πŸ“Š CSV Data Analysis: Processes large transaction datasets
  • 🎨 Modern GUI Interface: User-friendly tkinter-based interface
  • πŸ“ˆ Real-time Progress: Progress tracking during analysis
  • πŸ’Ύ Export Results: Save findings to text files

Supported Flag Patterns:

  • flag{...}
  • FLAG{...}
  • CTF{...}
  • cyboria{...}
  • CYBORIA{...}
  • Generic pattern{...}

πŸ› CTF Week 9&10: GUI Debugger

Code debugging and logic analysis challenge

cd "WEEK-9&10"
python "CTF-W9-Milestone 2.py"

Features:

  • πŸ” Code Analysis: Debug Python GUI applications
  • 🧩 Logic Flow Tracing: Understand code execution paths
  • 🎯 Flag Discovery: Find hidden flags through code debugging
  • 🎨 Interactive GUI: Test and validate code behavior

Learning Objectives:

  • Code debugging techniques
  • Understanding program flow
  • GUI application testing
  • CTF problem-solving strategies

πŸ“ Week 2: Regex Info Extractor

Pattern matching and data extraction tool

cd WEEK-2
# For Jupyter Notebook
jupyter notebook Regex_Info_Extractor.ipynb
# For Python script
python regexExtractor.py

πŸ“Š Week 3: Log Analysis Tool

Security log analysis and forensics

cd WEEK-3
jupyter notebook log_analysis_tool.ipynb

🌐 Week 4: Web Parser & SQL Injection Tester

Web scraping and security testing tools

cd WEEK-4
python web_parser_app.py
python sql_injection_tester.py

πŸ” Week 5-6: Cryptographic Tools

Encryption, decryption, and password security

cd "WEEK-5&6"
python encoder-decoder.py
python "Hashing Passwords.py"
python milestone1_cryptic_vault.py

πŸ› οΈ Tools Overview

Week 1: File Analysis

  • File Reader: Basic file handling and text analysis
  • Mystery Text Decoder: CTF challenge for hidden content

Week 2: Pattern Matching

  • Regex Extractor: Advanced regular expression pattern matching
  • Data Validation: Input validation and sanitization tools

Week 3: Log Forensics

  • Access Log Analyzer: Web server log analysis
  • Security Event Detection: Anomaly detection in logs
  • Traffic Pattern Analysis: Network behavior analysis

Week 4: Web Security

  • HTML Parser: Web content extraction and analysis
  • SQL Injection Tester: Database security assessment
  • Web Vulnerability Scanner: Automated security testing

Week 5-6: Cryptography

  • Message Encoder/Decoder: Various encoding schemes
  • Password Hasher: SHA-256 and other hashing algorithms
  • Cryptic Vault: Advanced encryption challenges

Week 7: Advanced Forensics

  • Flag Decoder: Multi-format encoded data analysis
  • Transaction Forensics: Financial data investigation
  • Pattern Recognition: AI-assisted flag detection

Week 8: Web Traffic Analysis

  • HAR File Analyzer: HTTP Archive file forensics
  • Session Token Extractor: Authentication token analysis
  • Network Traffic Inspector: Web traffic pattern analysis
  • Request Replay Tool: HTTP request testing and validation

Week 9&10: Code Debugging & Analysis

  • GUI Debugger: Interactive code debugging challenges
  • Logic Flow Analysis: Program execution path tracing
  • Code CTF Solutions: Debugging-based flag discovery

πŸ“‹ Requirements

System Requirements

  • OS: Windows 10/11, macOS 10.14+, or Linux
  • Python: 3.8 or higher
  • Memory: 4GB RAM minimum (8GB recommended for large datasets)
  • Storage: 500MB free space

Python Dependencies

pandas>=2.2.3
tkinter (built-in)
numpy>=1.24.0
matplotlib>=3.7.0
seaborn>=0.12.0
requests>=2.31.0
beautifulsoup4>=4.13.4
jupyter>=1.0.0
pyperclip>=1.8.2
cryptography>=44.0.2

🎯 CTF Challenges

Available CTF Files

  1. Week 1: CTF-W1_mystery_text_file.txt - Text analysis challenge
  2. Week 3: CTF-W3_expanded_access_logs.txt - Log forensics
  3. Week 5: CTF-W5-Milestone1_large_hashed_passwords.txt - Password cracking
  4. Week 5: CTF-W5-Milestone1_large_wordlist.txt - Dictionary attacks
  5. Week 7: CTF-W7_large_leaked_transactions.csv - Financial forensics
  6. Week 8: CTF-W8_large_captured_web_traffic.har - Web traffic analysis
  7. Week 9&10: CTF-W9-Milestone 2.py - GUI debugging challenge

CTF Solving Tips

  • Use the appropriate tool for each week's challenge
  • Check for multiple encoding layers
  • Look for patterns in data structure
  • Consider steganography techniques
  • Validate findings with multiple methods

πŸ”§ Troubleshooting

Common Issues

ModuleNotFoundError:

# Ensure virtual environment is activated
env\Scripts\activate
pip install -r requirements.txt

GUI Not Appearing:

  • Check Python tkinter installation
  • Verify display settings on remote systems
  • Run in local environment if using SSH

Large File Processing:

  • Increase system memory allocation
  • Process files in chunks
  • Use streaming methods for CSV files

Permission Errors:

  • Run terminal as administrator (Windows)
  • Check file permissions
  • Ensure write access to output directories

Performance Optimization

  • Large Datasets: Use pandas chunking for files >100MB
  • Memory Usage: Monitor RAM usage during analysis
  • Processing Speed: Enable multiprocessing for CPU-intensive tasks

πŸ“š Educational Objectives

Learning Outcomes

  • File Forensics: Digital evidence analysis techniques
  • Pattern Recognition: Advanced regex and data mining
  • Web Security: Vulnerability assessment and testing
  • Cryptanalysis: Encryption/decryption methodologies
  • Log Analysis: Security incident investigation
  • CTF Methodologies: Competitive cybersecurity techniques

Skills Developed

  • Python programming for security applications
  • GUI development with tkinter
  • Data analysis with pandas and numpy
  • Web scraping and parsing
  • Cryptographic implementations
  • Digital forensics techniques

🀝 Contributing

This is an educational project for MO-IT143. Contributions should follow academic integrity guidelines.

πŸ“„ License

Educational use only. See course guidelines for usage restrictions.

πŸ“ž Support

For technical issues or questions:

  1. Check the troubleshooting section
  2. Review course materials
  3. Contact course instructor
  4. Check Python documentation for specific modules

Author: MO-IT143 Student
Course: Ethical Hacking and Cybersecurity
Last Updated: October 10, 2025

πŸ“… Project Timeline - Gantt Chart

The following Gantt chart visualizes the development timeline and learning progression throughout the MO-IT143 Ethical Hacking course:

gantt
    title MO-IT143 Ethical Hacking - Course Timeline & Development Progress
    dateFormat YYYY-MM-DD
    axisFormat %b %d
    excludes weekends
    
    section Course Foundation
    Course Introduction         :done, intro, 2025-01-15, 2d
    Environment Setup          :done, setup, after intro, 3d
    
    section Week 1 - File Analysis
    File Handling Fundamentals :done, w1_theory, 2025-01-20, 2d
    Mystery Text File CTF      :done, w1_ctf, after w1_theory, 2d
    File Reader Development    :done, w1_dev, after w1_ctf, 3d
    Week 1 Assessment         :done, w1_assess, after w1_dev, 1d
    
    section Week 2 - Pattern Matching
    Regex Theory & Concepts    :done, w2_theory, 2025-01-27, 2d
    Regex Extractor GUI        :done, w2_gui, after w2_theory, 3d
    File Handling App          :done, w2_app, after w2_gui, 2d
    Jupyter Notebook Lab       :done, w2_lab, after w2_app, 2d
    Week 2 Deliverables       :done, w2_deliver, after w2_lab, 1d
    
    section Week 3 - Log Forensics
    Log Analysis Fundamentals  :done, w3_theory, 2025-02-03, 2d
    Access Log Investigation   :done, w3_ctf, after w3_theory, 2d
    Analysis Tool Development  :done, w3_tool, after w3_ctf, 3d
    Security Event Detection   :done, w3_detection, after w3_tool, 2d
    Week 3 Reflection         :done, w3_reflect, after w3_detection, 1d
    
    section Week 4 - Web Security
    Web Scraping Techniques    :done, w4_theory, 2025-02-10, 2d
    HTML Parser Implementation :done, w4_parser, after w4_theory, 3d
    SQL Injection Testing      :done, w4_sql, after w4_parser, 3d
    Web Security Assessment    :done, w4_security, after w4_sql, 2d
    Week 4 Documentation      :done, w4_docs, after w4_security, 1d
    
    section Week 5-6 - Cryptography
    Cryptographic Foundations  :done, w5_theory, 2025-02-17, 3d
    Encoder-Decoder Tool       :done, w5_encoder, after w5_theory, 3d
    Password Hashing System    :done, w5_hash, after w5_encoder, 3d
    Cryptic Vault Challenge    :done, w5_vault, after w5_hash, 4d
    Milestone 1 CTF           :done, w5_ctf, after w5_vault, 3d
    Cryptography Assessment   :done, w5_assess, after w5_ctf, 2d
    
    section Week 7 - Advanced Forensics
    Digital Forensics Theory   :done, w7_theory, 2025-03-03, 2d
    Transaction Data Analysis  :done, w7_analysis, after w7_theory, 2d
    Flag Decoder Development   :done, w7_decoder, after w7_analysis, 4d
    Multi-Format Encoding      :done, w7_encoding, after w7_decoder, 2d
    CTF Challenge Solution     :done, w7_ctf, after w7_encoding, 3d
    Final Implementation      :done, w7_final, after w7_ctf, 2d
    Week 7 Reflection         :done, w7_reflect, after w7_final, 1d
    
    section Week 8 - Web Traffic Analysis
    HAR File Format Study      :done, w8_theory, 2025-03-10, 2d
    Network Traffic Analysis   :done, w8_analysis, after w8_theory, 2d
    HAR Analyzer Development   :done, w8_analyzer, after w8_analysis, 4d
    Session Token Extraction   :done, w8_tokens, after w8_analyzer, 2d
    CTF Traffic Investigation  :done, w8_ctf, after w8_tokens, 3d
    Request Replay Features    :done, w8_replay, after w8_ctf, 2d
    Week 8 Documentation      :done, w8_docs, after w8_replay, 1d
    
    section Week 9-10 - Code Debugging & Final Projects
    Debugging Fundamentals     :done, w9_theory, 2025-03-17, 2d
    GUI Code Analysis          :done, w9_analysis, after w9_theory, 2d
    Logic Flow Tracing         :done, w9_debug, after w9_analysis, 3d
    CTF Debugging Challenge    :done, w9_ctf, after w9_debug, 2d
    Final Project Integration  :done, w9_integration, after w9_ctf, 3d
    Course Completion Review   :done, w9_review, after w9_integration, 2d
    
    section Project Milestones
    Environment Configured     :milestone, m1, 2025-01-18, 0d
    First CTF Solved          :milestone, m2, 2025-01-24, 0d
    GUI Applications Ready    :milestone, m3, 2025-02-01, 0d
    Log Analysis Complete     :milestone, m4, 2025-02-08, 0d
    Web Security Tools Done   :milestone, m5, 2025-02-15, 0d
    Crypto Milestone 1        :milestone, m6, 2025-03-01, 0d
    Flag Decoder Released     :milestone, m7, 2025-03-10, 0d
    HAR Analyzer Complete     :milestone, m8, 2025-03-17, 0d
    Course Completion         :milestone, final, 2025-03-24, 0d
    
    section Documentation
    README Development        :done, docs_readme, 2025-01-15, 2025-10-10
    Code Documentation        :done, docs_code, 2025-02-01, 2025-10-10
    Weekly Reflections        :done, docs_reflect, 2025-01-20, 2025-10-10
    Final Project Report      :done, docs_final, 2025-03-10, 1w
Loading

πŸ“Š Timeline Highlights:

  • πŸš€ Course Duration: January 15 - March 24, 2025 (10 weeks)
  • 🎯 Active Phase: Course Completed - All weeks finished
  • πŸ† Milestones Achieved: 9 out of 9 major milestones completed
  • πŸ“ˆ Progress Status: 100% complete

πŸ“‹ Weekly Focus Areas:

Week Focus Area Key Deliverables Status
Week 1 File Analysis File Reader, Mystery Text CTF βœ… Complete
Week 2 Pattern Matching Regex Extractor, GUI Applications βœ… Complete
Week 3 Log Forensics Access Log Analysis, Security Detection βœ… Complete
Week 4 Web Security HTML Parser, SQL Injection Tester βœ… Complete
Week 5-6 Cryptography Encoder/Decoder, Password Hashing, Cryptic Vault βœ… Complete
Week 7 Advanced Forensics Flag Decoder, Transaction Analysis βœ… Complete
Week 8 Web Traffic Analysis HAR Analyzer, Session Token Extraction βœ… Complete
Week 9-10 Code Debugging GUI Debugger, Logic Flow Analysis βœ… Complete

🎯 Course Status - All Complete:

  • βœ… Week 1: File Analysis (Complete)
  • βœ… Week 2: Pattern Matching (Complete)
  • βœ… Week 3: Log Forensics (Complete)
  • βœ… Week 4: Web Security (Complete)
  • βœ… Week 5-6: Cryptography (Complete)
  • βœ… Week 7: Advanced Forensics (Complete)
  • βœ… Week 8: Web Traffic Analysis (Complete)
  • βœ… Week 9-10: Code Debugging & Final Projects (Complete)

About

This repository is a comprehensive collection of ethical hacking tools, CTF challenges, and cybersecurity utilities developed for the MO-IT143 course. It contains practical implementations of various security analysis tools including file readers, regex extractors, log analyzers, web parsers, cryptographic tools, and flag decoders.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors