Category: General
-
Forensics
–
So you’ve selected forensics, huh? Alright, well let’s get you started with some helpful material to learn all about forensics. What is Forensics? In a CTF context, “Forensics” challenges can include file format analysis, steganography, memory dump analysis, hard drive analysis, or network packet capture analysis. Any challenge to examine and process a hidden piece…
-
Reverse Engineering
–
So you’ve selected reverse engineering, huh? Alright, your funeral… well let’s get you started with some helpful material to learn about reverse engineering. Prerequisites Before getting into reverse engineering, there are some things you will need to have. They are listed below: * For each OS, so one for Linux, Windows etc What is Reverse…
-
Cryptography
–
selected cryptography, huh? Alright, well let’s get you started with some helpful material to learn how to crypto. Prerequisites Before getting into cryptography, there are some things you will need to have. They are listed below: Helpful Links For information about RSA, you can check out Computerphile’s video here. They also have a video on AES here.…
-
Binary Exploitation
–
So you’ve selected binary exploitation, huh? Alright, well let’s get you started with some helpful material to learn how to “pwn”. Prerequisites Before getting into binary exploitation, there are some things you will need to have. They are listed below: Helpful Links I highly highly recommend first learning a little bit about assembly and the…
-
Web Exploitation
–
Prerequisites Before getting into web exploitation, there are some things you will need to have. They are listed below: Helpful Links To get started, there are some good places to look. One of the first things I ever did was read the OWASP Vulnerabilities page which links practically every web application vulnerability in existence. Be careful, lots…