In computer security Capture the Flag (CTF), “flags” are secrets hidden in purposefully-vulnerable programs or websites. Competitors steal flags either from other competitors (attack/defense-style CTFs) or from the organizers (jeopardy-style challenges).
A cybersecurity capture the flag is a team-based competition in which participants use cybersecurity tools and techniques to find hidden clues or “flags”. The team that locates the most flags during the event wins. These events are often entry-level and open to the public.
When a player is in an opposing team’s territory, they can be captured by that team’s players. If they tag the player, the player must perform a task—say, five jumping jacks or three push-ups—before returning to their own territory.
Capture the Flag (CTF) is a special kind of information security competitions. Well, attack-defence is another interesting kind of competitions. Here every team has own network(or only one host) with vulnarable services. Your team has time for patching your services and developing exploits usually.
One of the CTFs that was particularly interesting to me was the Google CTF. One can opt to go for the beginner challenges to see where the skill level really was at – and although it is “mostly” easy, there are still some challenges that can make the competition tough.
CTFs enable you to develop your problem solving and analytical skills to use in real-work scenarios. CTF tasks are usually based on real-world vulnerabilities and security incidents. Nowadays, CTF problems are asked in job interviews to test the skills of professionals.
I. Nmap
II. Metasploit
III. SQLMAP
IV. Burp Suite
V. Wireshark | TCPDUMP
VI. Nikto
VII. Curl
VIII. Netcat
IX. wpscan
X. John the ripper
a. CTF Classification
b. Cryptography
c. Steganography
d. Encoding
e. Binary
f. Pwn
g. Web
h. Network