What Are CTF
CTF or Capture The Flag , are information security challenges . The main goal of those challenges is to find the flag, which is a phrase that has a standard format and is the proof you managed to solve the challenge (e.g. flag{th1s_Is_an_3xampl3} ). The format of the flag is given most of the time .
CTF Categories
- Typically involves decrypting or encrypting a piece of data
- Random ,requiring simple logic, knowledge, and patience to be solved.
- Tasked with finding information hidden in files
or images
- Binary /RE :
- Reverse engineering or exploiting a binary file
- Web :
- Exploiting(finding a security flaw and using it to gain access to)
web pages to find the flag
- Pwn :
- Exploiting(taking control of) a server to find the flag
- Reverse Enginnering :
- Analyzing source coude , trying to figure out it’s
function and finding hidden messages (that’s the challenge)