Главная
Study mode:
on
1
Intro
2
The Competition
3
Motivation
4
Instant Feedback
5
New York Competition
6
DEFCON CTF
7
The Next Step
8
Actively Participate
9
Read Writeups
10
Diversity
11
Qualifying
12
DEFCON Finals
13
Jeopardy vs Attack Defense
14
DEFCON Final
15
Examples
16
Why CTFs
17
CTFs motivate people
Description:
Explore the world of competitive hacking in this 21-minute conference talk from USENIX Enigma 2016. Gain insights into building an effective Capture the Flag (CTF) team, drawing from the experiences of Carnegie Mellon's Plaid Parliament of Pwning. Discover the growing importance of cybersecurity exercises, their relevance for students, experts, and recruiters, and learn how to make CTF participation more enjoyable and accessible. Delve into topics such as competition motivation, instant feedback, diverse team composition, and the differences between Jeopardy-style and Attack-Defense CTFs. Understand why CTFs are valuable for skill development and how they motivate cybersecurity enthusiasts. Get practical advice on active participation, reading writeups, and progressing from qualifying rounds to prestigious events like DEFCON CTF Finals.

Building a Competitive Hacking Team - USENIX Enigma 2016

USENIX Enigma Conference
Add to list