INTRODUCTION TO CAPTURE THE FLAG
What is CTF?
Capture The Flags, or CTF, are a kind of computer security competition.
Types of CTF
- Jeopardy Method.
Each player or team, by the time he solves a challenge he submits the flag on a scoring board provided by the organizers and acquires the corresponding points for resolve it.
Winner is the one who accrues most points.- Attack-Defense Method.
Types of Challenges
CTFs usually showcase different challenges that utilize or exercise specific areas of focus. Some popular areas of focus are:
- Cryptography
- These challenges feature common “real world” scenarios that often include the ever-popular ransomware type of malware.
- WEB Exploitation
- These tasks will force you to determine how to exploit (using buffer overflow, string format, SQL injection, etc.…) a given running process on the CTF target machine.
- Reverse Engineering
- For tasks like this, reverse engineering will usually be required, for example, when the server sends you an executable.
- PWN The objective of PWN challenges is for the player to acquire access to a target system without the system administrator's permission. The targets can be personal computers, servers, websites, networking devices or applications.
- These challenges feature common “real world” scenarios that often include the ever-popular ransomware type of malware.
- These tasks will force you to determine how to exploit (using buffer overflow, string format, SQL injection, etc.…) a given running process on the CTF target machine.
- For tasks like this, reverse engineering will usually be required, for example, when the server sends you an executable.
0 comments:
Post a Comment