Overview
Explore the world of competitive hacking in this 21-minute conference talk from USENIX Enigma 2016. Gain insights into building an effective Capture the Flag (CTF) team, drawing from the experiences of Carnegie Mellon's Plaid Parliament of Pwning. Discover the growing importance of cybersecurity exercises, their relevance for students, experts, and recruiters, and learn how to make CTF participation more enjoyable and accessible. Delve into topics such as competition motivation, instant feedback, diverse team composition, and the differences between Jeopardy-style and Attack-Defense CTFs. Understand why CTFs are valuable for skill development and how they motivate cybersecurity enthusiasts. Get practical advice on active participation, reading writeups, and progressing from qualifying rounds to prestigious events like DEFCON CTF Finals.
Syllabus
Intro
The Competition
Motivation
Instant Feedback
New York Competition
DEFCON CTF
The Next Step
Actively Participate
Read Writeups
Diversity
Qualifying
DEFCON Finals
Jeopardy vs Attack Defense
DEFCON Final
Examples
Why CTFs
CTFs motivate people
Taught by
USENIX Enigma Conference