YoVDO

HackIM CTF - Do's and Don'ts

Offered By: nullcon via YouTube

Tags

nullcon Courses Cryptography Courses Ethical Hacking Courses Reverse Engineering Courses Web Security Courses Forensics Courses Binary Exploitation Courses

Course Description

Overview

Discover the ins and outs of Capture the Flag (CTF) competitions in this informative webinar led by Sudhakar Verma, Security Researcher at Payatu Software Labs. Learn about different types of CTFs, including Jeopardy-style and Attack-Defense formats. Gain valuable insights into proper CTF etiquette, including what to avoid during competitions. Explore the annual Nullcon HackIM CTF event, which precedes the Nullcon security conference in India. Enhance your understanding of information security challenges and improve your skills in areas such as web security, cryptography, reverse engineering, binary exploitation, and forensics. Whether you're a beginner or experienced in CTFs, acquire essential knowledge to participate effectively and ethically in these exciting cybersecurity competitions.

Syllabus

Intro
Hacking For Fun and Profit
Capture the Flag (CTF) is a special kind of information security competitions where the participants learn by solving innovative security challenges.
Types of CTFs
Jeopardy Multiple challenges in a range of categories not limited to - web, cryptography, reverse engineering, binary exploitation, forensics, etc. You get points for challenges by submitting "flags", more the points higher you are on the scoreboard.
Attack Defense Each participant has a VM network that they defend/patch and attack others simultaneosly
How to CTF?
Dont's • Use automated tools • Attack the infrastructure • Be Salty • Share Flags/Spoilers with other teams
Nullcon HackIM CTF An annual CTF event which precedes Nullcon - a security conference in India. This year will be 11th edition of this CTF


Taught by

nullcon

Related Courses

Unearthing Malicious and Risky OpenSource Packages Using Packj
nullcon via YouTube
Pushing Security Left by Mutating Byte Code
nullcon via YouTube
The Faces of MacOS Malware - Detecting Anomalies in a Poisoned Apple
nullcon via YouTube
Contextomy - Let's Debug Together
nullcon via YouTube
Mind The Gap - The Linux Ecosystem Kernel Patch Gap
nullcon via YouTube