Главная
Study mode:
on
1
Intro
2
Whos in the room
3
Challenge Makers
4
CTF
5
CTF Experience
6
CTF or WTF
7
Whats a game
8
Wikipedia
9
Fun
10
Difficult
11
Competitive
12
Frustration
13
Pressure
14
Sunday Night
15
Dont Worry
16
Denial
17
Secret Web Stuff
18
Forensics
19
Crypto Challenges
20
Reverse Engineering
21
Exploit Building
22
Network Security
23
Enterprise CTF
24
Linux
25
Windows
26
No defense team
27
Logs
28
Active Directory
29
User Awareness
30
Why the CTF
31
What did you learn
32
Pro tip
33
SQL injection
34
The real world
35
Blacklists
36
NorthSec 2013
37
Badges
38
Ask questions
39
Text addiction
40
Insecure stuff
41
People just started caring
42
Security wasnt a core requirement
43
Magical thinking
44
Youre crazy
45
Dont underestimate your attackers
46
PCI compliant
47
Easier to break
48
You never know
49
Reset your brain
50
Conclusion
Description:
Explore a conference talk comparing Capture The Flag (CTF) challenges with real-world penetration tests and security program assessments. Delve into the gamification aspects of CTFs, including their fun, competitive, and sometimes frustrating nature. Examine various challenge types such as web security, forensics, cryptography, reverse engineering, and exploit building. Contrast these with enterprise-focused scenarios involving Linux, Windows, Active Directory, and user awareness. Gain insights into how CTF experiences translate to real-world security situations, covering topics like SQL injection, blacklists, and compliance. Learn valuable lessons about attacker mindsets, the importance of security as a core requirement, and the dangers of underestimating adversaries. Conclude with a reminder to reset your perspective when approaching security challenges.

CTF or WTF?

NorthSec
Add to list
0:00 / 0:00