Overview
Explore the world of competitive hacking and Capture The Flag (CTF) competitions in this 50-minute conference talk from Circle City Con 2014. Dive into various CTF styles, including Jeopardy and Attack-Defense, while learning about the history and benefits of participating in these events. Gain insights into key areas such as reverse engineering, binary exploitation, cryptography, forensics, and web exploitation. Discover valuable tips for beginners, dirty tricks, and shell techniques used by experienced players. Listen to a CTF war story and learn about the Samurai Team's approach to these challenges. Engage with the speaker during a Q&A session to further enhance your understanding of competitive hacking and its importance in the cybersecurity landscape.
Syllabus
Intro
Shall we play a game?
Jeopardy Style
Attack Defense
Styles of CTF
Why Play CTF?
Hint for Challenge #1
History of CTF
Reverse Engineering
Hint for challenge #2
Binary Exploitation
Cryptography
Forensics
Web Exploitation
Just Starting Out
Dirty Tricks
Shell Tricks
Samurai Team
CTF War Story
Questions