Sunday, 17 May 2020

Introduction to Capture The Flag

           INTRODUCTION TO CAPTURE THE FLAG



               

What is CTF?             

           Capture The Flags, or CTF, are a kind of computer security competition.

Types of CTF
  • Jeopardy Method.
                 Each player or team, by the time he solves a challenge he submits the flag on a scoring board provided by the organizers and acquires the corresponding points for resolve it.
                  Winner is the one who accrues most points.
  • Attack-Defense Method. 
                  In an Attack – Defense scenario, players are divided into groups. Each team is given by the organizers one or more servers with weaknesses and hidden flags.



Types of Challenges

CTFs usually showcase different challenges that utilize or exercise specific areas of focus. Some popular areas of focus are:
  • Cryptography
    • These challenges feature common “real world” scenarios that often include the ever-popular ransomware type of malware.
  • WEB Exploitation
    • These tasks will force you to determine how to exploit (using buffer overflow, string format, SQL injection, etc.…) a given running process on the CTF target machine.
  • Reverse Engineering
    • For tasks like this, reverse engineering will usually be required, for example, when the server sends you an executable.

  • PWN                                                                                                                             The objective of PWN challenges is for the player to acquire access to a target system                   without the system administrator's permission. The targets can be personal computers,                     servers, websites, networking devices or applications.

  • Forensics                                                                                                                                            Anything related to Forensics. Quite often also containing                                          Stenography, which is regarded as non-forensics by regular CTF                                  players. Challenges can include Windows, Linux, Android or Exotic                       platforms forensics.
CTF Video Explanation link Below

                           
                        https://www.youtube.com/watch?v=ZA6HYYHCAhI


Do Share and Subscribe my Channel


Subscribe and Share to your Friends


0 comments:

Post a Comment