
CTF Handbook
Oct 15, 2024 · Capture The Flag 101 🚩 Welcome. Welcome to CTF101, a site documenting the basics of playing Capture the Flags. This guide was written and maintained by the OSIRIS Lab …
What is a CTF - CTF Handbook - CTF101
Oct 15, 2024 · What is a CTF? Capture the Flags, or CTFs, are computer security competitions. Teams of competitors (or just individuals) are pitted against each other in various challenges …
Overview - CTF Handbook - CTF101
Jan 26, 2024 · CTF Handbook osiris/ctf101 Home Introduction Introduction What is a CTF Getting Started with CTFs How do I host a CTF Forensics Forensics Overview File Formats Metadata …
Stegonagraphy - CTF Handbook - CTF101
Steganography. Steganography is the practice of hiding data in plain sight. Steganography is often embedded in images or audio. You could send a picture of a cat to a friend and hide text …
SQL Injection - CTF Handbook - CTF101
Apr 30, 2024 · Capture the Flag Competition Wiki. This payload sets the username parameter to an empty string to break out of the query and then adds a comment (--) that effectively hides …
Overview - CTF Handbook - CTF101
Jan 26, 2024 · Reverse Engineering in a CTF is typically the process of taking a compiled (machine code, bytecode) program and converting it back into a more human readable format. …
Overview - CTF Handbook - CTF101
Jan 26, 2024 · Web Exploitation. Websites all around the world are programmed using various programming languages. While there are specific vulnerabilities in each programming …
Assembly/Machine Code - CTF Handbook - CTF101
Feb 8, 2024 · Assembly/Machine Code. Machine Code or Assembly is code which has been formatted for direct execution by a CPU. Machine Code is the reason why readable …
Relocation Read-Only (RELRO) - CTF Handbook - CTF101
Jan 26, 2024 · CTF Handbook Relocation Read-Only (RELRO) Initializing search osiris/ctf101 Home Introduction Forensics Cryptography Web Exploitation Reverse Engineering Binary …
Overview - CTF Handbook - CTF101
Jan 26, 2024 · Unlike CTFs normally portray them, real-world forensics are rarely esoteric. For example, it might have you reassembling the boot partitions of a hard drive to recover it's data …