CAPTURE THE FLAG (CTF). Maxim A. Kulakov (Vladimir State University) Email: email@example.com Twitter: @kulakov_maxim. Information security training/studying problems. University programs on Information security Too much theory, the lack of practice DEFENSE – YES, ATTACK - NO
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Maxim A. Kulakov (Vladimir State University)
Capture the Flag (CTF) is a computer security competition.
Originally a children’s game to simulate small team combat, based on defending an immobile flag while trying to capture the flag of the other team.
CTF network types:
multi-site, multi-team hacking contest in which a number of teams compete independently against each other
TEAMS ARE ALLOWED TO
TEAMS ARE PROHIBITED TO
Example: find buffer overflow vulnerability in the Linux binary, exploit the remote training system and get the flag
Example: find SQL-injection vulnerability at the training site and get the flag from the site’s database
Example: analyze cryptosystem and decrypt the cipher text
Example: analyze and get registration code (flag) for Windows binary
Example: analyze the hard disk image and recover the deleted file with flag
Example: detect the LSB steganography in the BMP image and extract the flag