YoVDO

HackIM CTF - Do's and Don'ts

Offered By: nullcon via YouTube

Tags

nullcon Courses Cryptography Courses Ethical Hacking Courses Reverse Engineering Courses Web Security Courses Forensics Courses Binary Exploitation Courses

Course Description

Overview

Discover the ins and outs of Capture the Flag (CTF) competitions in this informative webinar led by Sudhakar Verma, Security Researcher at Payatu Software Labs. Learn about different types of CTFs, including Jeopardy-style and Attack-Defense formats. Gain valuable insights into proper CTF etiquette, including what to avoid during competitions. Explore the annual Nullcon HackIM CTF event, which precedes the Nullcon security conference in India. Enhance your understanding of information security challenges and improve your skills in areas such as web security, cryptography, reverse engineering, binary exploitation, and forensics. Whether you're a beginner or experienced in CTFs, acquire essential knowledge to participate effectively and ethically in these exciting cybersecurity competitions.

Syllabus

Intro
Hacking For Fun and Profit
Capture the Flag (CTF) is a special kind of information security competitions where the participants learn by solving innovative security challenges.
Types of CTFs
Jeopardy Multiple challenges in a range of categories not limited to - web, cryptography, reverse engineering, binary exploitation, forensics, etc. You get points for challenges by submitting "flags", more the points higher you are on the scoreboard.
Attack Defense Each participant has a VM network that they defend/patch and attack others simultaneosly
How to CTF?
Dont's • Use automated tools • Attack the infrastructure • Be Salty • Share Flags/Spoilers with other teams
Nullcon HackIM CTF An annual CTF event which precedes Nullcon - a security conference in India. This year will be 11th edition of this CTF


Taught by

nullcon

Related Courses

Arm assembly for Hackers
Udemy
Intro to Binary Exploitation
HTB Academy via Independent
File Structures - Another Binary Exploitation Technique
Hack In The Box Security Conference via YouTube
ELFPack - ELF Binary Section Docking in Stageless Payload Delivery
Ekoparty Security Conference via YouTube
Monitoring Endpoints, Binary Exploitation, and Continuous Recon - Security Discussion
NahamSec via YouTube