๐ CTF Tools & Setup
Please set these up before the event so you can focus on solving challenges, not installing tools.
Link: https://gchq.github.io/CyberChef/
- No installation required — runs in your browser โ
- Good starting recipes: From Base64, From Hex, ROT13, and Magic.
- You can drag & drop text files or binaries directly into CyberChef.
Download: https://www.wireshark.org/download.html
Windows:
- Download the latest .exe installer from the Wireshark website.
- Run the installer and accept default options.
- Allow installation of Npcap when prompted (needed for packet capture).
macOS:
- Download the latest .dmg installer.
- Drag Wireshark into
Applications. - If blocked, allow it under System Settings โ Privacy & Security.
Linux (Debian/Ubuntu-based):
sudo apt update
sudo apt install wireshark
When asked about non-root packet capture, choose Yes and add your user to the
wireshark group.
Quick test: open Wireshark. If the main window loads and menus appear normally, you're set.
Website: https://www.openwall.com/john/
Windows (community build):
- From the John site, follow the link to the community builds for Windows.
- Download the latest
.zipbuild. - Extract to a folder, for example:
C:\john. - Open Command Prompt and run:
cd C:\john\run
john --help
macOS (Homebrew):
brew install john
john --help
Linux (Debian/Ubuntu-based):
sudo apt update
sudo apt install john
john --help
Basic usage pattern:
john <hash_file> --wordlist=<path_to_wordlist.txt>
Example: cracking hashes stored in hashes.txt with a wordlist
rockyou.txt.
โ Pre-Event Checklist
- Wireshark opens without errors.
john --helpruns successfully in your terminal / command prompt.- CyberChef is bookmarked in your browser.
If you run into any issues installing these tools, please ask for help in the event Discord — weโll have people available to assist with setup.