Capture the Flag (CTF) is a special kind of information security competitions where the participants learn by solving innovative security challenges.
4
Types of CTFs
5
Jeopardy Multiple challenges in a range of categories not limited to - web, cryptography, reverse engineering, binary exploitation, forensics, etc. You get points for challenges by submitting "flags"…
6
Attack Defense Each participant has a VM network that they defend/patch and attack others simultaneosly
7
How to CTF?
8
Dont's • Use automated tools • Attack the infrastructure • Be Salty • Share Flags/Spoilers with other teams
9
Nullcon HackIM CTF An annual CTF event which precedes Nullcon - a security conference in India. This year will be 11th edition of this CTF
Description:
Discover the ins and outs of Capture the Flag (CTF) competitions in this informative webinar led by Sudhakar Verma, Security Researcher at Payatu Software Labs. Learn about different types of CTFs, including Jeopardy-style and Attack-Defense formats. Gain valuable insights into proper CTF etiquette, including what to avoid during competitions. Explore the annual Nullcon HackIM CTF event, which precedes the Nullcon security conference in India. Enhance your understanding of information security challenges and improve your skills in areas such as web security, cryptography, reverse engineering, binary exploitation, and forensics. Whether you're a beginner or experienced in CTFs, acquire essential knowledge to participate effectively and ethically in these exciting cybersecurity competitions.