Главная
Study mode:
on
1
Intro
2
Who am I
3
Objectives
4
Quick definitions
5
Types of CTF
6
Where to find CTF
7
Common CTF commonalities
8
Specialized CTFs
9
Kali
10
Not being realistic
11
Too vulnerable
12
gimmicky game
13
bug bounties
14
open CTFs
15
security research
16
security team
17
OSWP
18
How to secure a router
19
Setup
20
Password Change
21
Login
22
What do we do
23
DLink
24
Vulnerability disclosure
25
Learning the process
26
DEFCON 404
27
Cert
28
Full Disclosure
29
Not all CTS are garbage
30
Hacking Glasses
31
Future Speaking engagements
32
Questions
33
Next logical step
Description:
Explore the journey from Capture The Flag (CTF) competitions to Common Vulnerabilities and Exposures (CVE) discovery in this 56-minute conference talk by Joe Gray at LevelUp 0x03. Gain insights into applying CTF concepts to real-world scenarios, learn about the responsible disclosure process, and understand how persistence led to a vulnerability disclosure. Discover various types of CTFs, where to find them, and their commonalities. Examine the limitations of CTFs and how to bridge the gap between these competitions and practical security research. Follow along as Gray shares his experience uncovering vulnerabilities in a wireless router, highlighting the importance of continuous learning and skill application in cybersecurity.

From CTF to CVE by Joe Gray

Bugcrowd
Add to list