1. Basics of Computer. 2. Basics of Operating System(Mainly Linux OS and Shell)
3. Moderate Debugging Skills. 4. Basics of Networking and Computer Security.
5. Programming Language(Basic C/C++) and Python Scripting Language. 6. Basics Understanding of Cryptography(Encryption/Decryption). 7. Knowledge of Binary, HexaDecimal, ASCII, Hexdump and Others Representation of Computer Data.
Capture The Flag(CTF) is a special kind of Security Competitions. There are Three common type of CTFs: 1) Jeopardy 2) Attack and Defence CTF 3) Mixed CTF In CTF Basically Flag is Special kind of "STrinG" which have to find for points.
- Binary Explotation
- pwn
- Reversing
- Web
- Forensic
- Stegnography
- Miscellaneous
- OS
- Linux
- RecOn/Scripting
Binary exploitation is the process of subverting a compiled application such that it violates some trust boundary in a way
that is advantageous to you, the attacker. In this module we are going to focus on memory corruption. By abusing
vulnerabilities that corrupt memory in software we can often rewrite critical application state information in a way that
allows us to elevate privileges inside the context of a particular application (like a remote desktop server) or perform arbitrary computation by hijacking control flow and running code of our choosing.
Folllow Below Links for Binary Exploitation
Reverse Engineering in a CTF is typically the process of taking a compiled (machine code, bytecode) program and converting it back into a more human readable format.
Very often the goal of a reverse engineering challenge is to understand the functionality of a given program such that you can identify deeper issues.
Folllow Links of Binary Exploitation
In Web Challenge Basically We have to Exploit Vulnerability in Protocol or Langauge, like PHP and xml OR We have to
take Control Over HTTP Requests which is to Server or From Server, But It is very Brief About CTF Web Challenges.
Follow Below Links for More Information
Forensics is a broad CTF category that does not map well to any particular job role in the security industry, although some challenges model the kinds of tasks seen in Incident Response (IR). Even in IR work, computer forensics is usually
the domain of law enforcement seeking evidentiary data and attribution, rather than the commercial incident
responder who may just be interested in expelling an attacker and/or restoring system integrity.,br>
Follow Below Links for More Information
Many challenges in CTFs will be completely random and unprecedented, requiring simply logic, knowledge, and patience to be solved. There is no sure-fire way to prepare for these, but as you complete more CTFs you will be able to recognize and hopefully have more clues on how to solve them.
Follow Below Links for More About Misc. Challenges
Basically This Challenges about of, Basic upto Advanced Level of Enumeration of Operating System Mainly Linux and its Shell.
In the case of CTFs, the goal is usually to crack or clone cryptographic objects or algorithms to reach the flag.
Follow Below Links for More Information about Crypto.
In this Challenges basically flag is hidden in Social Media Platform, and In Scripting Challenges You have to write script
which Automatically does Tasks.