Главная
Study mode:
on
1
Intro
2
Shall we play a game?
3
Jeopardy Style
4
Attack Defense
5
Styles of CTF
6
Why Play CTF?
7
Hint for Challenge #1
8
History of CTF
9
Reverse Engineering
10
Hint for challenge #2
11
Binary Exploitation
12
Cryptography
13
Forensics
14
Web Exploitation
15
Just Starting Out
16
Dirty Tricks
17
Shell Tricks
18
Samurai Team
19
CTF War Story
20
Questions
Description:
Explore the world of competitive hacking and Capture The Flag (CTF) competitions in this 50-minute conference talk from Circle City Con 2014. Dive into various CTF styles, including Jeopardy and Attack-Defense, while learning about the history and benefits of participating in these events. Gain insights into key areas such as reverse engineering, binary exploitation, cryptography, forensics, and web exploitation. Discover valuable tips for beginners, dirty tricks, and shell techniques used by experienced players. Listen to a CTF war story and learn about the Samurai Team's approach to these challenges. Engage with the speaker during a Q&A session to further enhance your understanding of competitive hacking and its importance in the cybersecurity landscape.

Competitive Hacking - Why You Should Capture the Flag

Add to list