
CTF Handbook
Oct 15, 2024 · Capture The Flag 101 🚩 Welcome. Welcome to CTF101, a site documenting the basics of playing Capture the Flags. This guide was written and maintained by the OSIRIS Lab at New York University in collaboration with CTFd.
What is a CTF - CTF Handbook - CTF101
Oct 15, 2024 · What is a CTF? Capture the Flags, or CTFs, are computer security competitions. Teams of competitors (or just individuals) are pitted against each other in various challenges across multiple security disciplines, competing to earn the most points. Why play CTFs?
Overview - CTF Handbook - CTF101
Jan 26, 2024 · CTF Handbook osiris/ctf101 Home Introduction Introduction What is a CTF Getting Started with CTFs How do I host a CTF Forensics Forensics Overview File Formats Metadata Stegonagraphy Disk Imaging Memory Forensics Hex Editors …
Stegonagraphy - CTF Handbook - CTF101
Steganography. Steganography is the practice of hiding data in plain sight. Steganography is often embedded in images or audio. You could send a picture of a cat to a friend and hide text inside.
SQL Injection - CTF Handbook - CTF101
Apr 30, 2024 · Capture the Flag Competition Wiki. This payload sets the username parameter to an empty string to break out of the query and then adds a comment (--) that effectively hides the second single quote.Using this technique of adding SQL statements to an existing query we can force databases to return data that it was not meant to return.
Overview - CTF Handbook - CTF101
Jan 26, 2024 · Reverse Engineering in a CTF is typically the process of taking a compiled (machine code, bytecode) program and converting it back into a more human readable format. Very often the goal of a reverse engineering challenge is to understand the functionality of a given program such that you can identify deeper issues.
Overview - CTF Handbook - CTF101
Jan 26, 2024 · Web Exploitation. Websites all around the world are programmed using various programming languages. While there are specific vulnerabilities in each programming langrage that the developer should be aware of, there are issues fundamental to the internet that can show up regardless of the chosen language or framework.
Assembly/Machine Code - CTF Handbook - CTF101
Feb 8, 2024 · Assembly/Machine Code. Machine Code or Assembly is code which has been formatted for direct execution by a CPU. Machine Code is the reason why readable programming languages like C, when compiled, cannot be reversed into source code (well Decompilers can sort of, but more on that later).. From Source to Compilation
Relocation Read-Only (RELRO) - CTF Handbook - CTF101
Jan 26, 2024 · CTF Handbook Relocation Read-Only (RELRO) Initializing search osiris/ctf101 Home Introduction Forensics Cryptography Web Exploitation Reverse Engineering Binary Exploitation FAQ CTF Handbook osiris/ctf101 Home Introduction Introduction What is a CTF Getting Started with CTFs ...
Overview - CTF Handbook - CTF101
Jan 26, 2024 · Unlike CTFs normally portray them, real-world forensics are rarely esoteric. For example, it might have you reassembling the boot partitions of a hard drive to recover it's data and file system. Thus, CTF forensics are normally puzzle, "brain-teaser" problems that aims to introduce a tool or method.