About 50 results
Open links in new tab
  1. CTF Handbook

    Oct 15, 2024 · Capture The Flag 101 🚩 Welcome. Welcome to CTF101, a site documenting the basics of playing Capture the Flags. This guide was written and maintained by the OSIRIS Lab …

  2. What is a CTF - CTF Handbook - CTF101

    Oct 15, 2024 · What is a CTF? Capture the Flags, or CTFs, are computer security competitions. Teams of competitors (or just individuals) are pitted against each other in various challenges …

  3. Overview - CTF Handbook - CTF101

    Jan 26, 2024 · CTF Handbook osiris/ctf101 Home Introduction Introduction What is a CTF Getting Started with CTFs How do I host a CTF Forensics Forensics Overview File Formats Metadata …

  4. Stegonagraphy - CTF Handbook - CTF101

    Steganography. Steganography is the practice of hiding data in plain sight. Steganography is often embedded in images or audio. You could send a picture of a cat to a friend and hide text …

  5. SQL Injection - CTF Handbook - CTF101

    Apr 30, 2024 · Capture the Flag Competition Wiki. This payload sets the username parameter to an empty string to break out of the query and then adds a comment (--) that effectively hides …

  6. Overview - CTF Handbook - CTF101

    Jan 26, 2024 · Reverse Engineering in a CTF is typically the process of taking a compiled (machine code, bytecode) program and converting it back into a more human readable format. …

  7. Overview - CTF Handbook - CTF101

    Jan 26, 2024 · Web Exploitation. Websites all around the world are programmed using various programming languages. While there are specific vulnerabilities in each programming …

  8. Assembly/Machine Code - CTF Handbook - CTF101

    Feb 8, 2024 · Assembly/Machine Code. Machine Code or Assembly is code which has been formatted for direct execution by a CPU. Machine Code is the reason why readable …

  9. Relocation Read-Only (RELRO) - CTF Handbook - CTF101

    Jan 26, 2024 · CTF Handbook Relocation Read-Only (RELRO) Initializing search osiris/ctf101 Home Introduction Forensics Cryptography Web Exploitation Reverse Engineering Binary …

  10. Overview - CTF Handbook - CTF101

    Jan 26, 2024 · Unlike CTFs normally portray them, real-world forensics are rarely esoteric. For example, it might have you reassembling the boot partitions of a hard drive to recover it's data …

Refresh