Completed
Jeopardy Multiple challenges in a range of categories not limited to - web, cryptography, reverse engineering, binary exploitation, forensics, etc. You get points for challenges by submitting "flags"…
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
HackIM CTF - Do's and Don'ts
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Hacking For Fun and Profit
- 3 Capture the Flag (CTF) is a special kind of information security competitions where the participants learn by solving innovative security challenges.
- 4 Types of CTFs
- 5 Jeopardy Multiple challenges in a range of categories not limited to - web, cryptography, reverse engineering, binary exploitation, forensics, etc. You get points for challenges by submitting "flags"…
- 6 Attack Defense Each participant has a VM network that they defend/patch and attack others simultaneosly
- 7 How to CTF?
- 8 Dont's • Use automated tools • Attack the infrastructure • Be Salty • Share Flags/Spoilers with other teams
- 9 Nullcon HackIM CTF An annual CTF event which precedes Nullcon - a security conference in India. This year will be 11th edition of this CTF