SlideShare a Scribd company logo
CaptureThe Flag
1
2
Omar Mohamed Fathy
Front-End Developer @ CyberTalents
AGENDA
• How to earn money from bugs?
• What is Bug bounty Program?
• What is CTF Competitions?
• Types of Challenges
• What are Flags?
• What is the write-up?
• Who can play in the CTF?
• CTF Competitions in Egypt
• Demo...
• CTF Resources
3
How to Earn
Money From
Bugs?
4
Bug Bounty
Program?
5
6
CTF Competitions
7
8
CTF COMPETITIONS
• Capture the Flag ( CTF) is an information security competition
• where participants demonstrate their technical ability.
• Jeopardy: Participants try to solve various challenges in different
• categories. Participants get points for every challenge they solve,
• the team with the highest number of points will be the winner.
• Attack and Defense: Participants attack other contestants while
• defending their own network/system, the team who was able to
• attack other team and defend his system will be the winner.
9
WHAT IS
CHALLENGE?
1
0
WHAT IS CHALLENGE?
• Challenges are the questions that you have to solve to get points.
• Every Challenge has a description, Difficulty level, category and
number of points to solve.
11
TYPES OF CHALLENGES
• Network Security
• Web Security
• Malware Reverse Engineering
• Digital Forensics
• Cryptography
• General Knowledge
• Others
12
WHAT ARE
FLAGS?
1
3
WHAT ARE FLAGS?
• Some sort of text/MD5 hash that you submit to CTF portal to get
• the challenge points.
• e.g. of flags : b1a1f2855d2428930e0c9c3ce10600d6
• flag{I_am_the_key}.
14
WHAT ISTHE
WRITEUP?
1
5
WHAT ISTHE WRITEUP
• This is a document or article describing the solution of a certain
• challenge.
• Reading write-ups is one of the main ways to get introduced to
• CTFs.
16
WHO CAN PLAY
INTHE CTF?
1
7
WHO CAN PLAY INTHE CTF?
• Anyone can play CTF, However each category need a set of skills :
• Development Skills, Network Skills, Web development skills.
• Problem Solving Skills.
• Patience and keep trying mentality.
18
CTF COMPETITIONS
IN EGYPT
1
9
CTF COMPETITIONS IN EGYPT
• EGYPT CYBER SECURITY NATIONAL CTF CyberTalents
• CyberWar Games
20
DEMO...
2
1
CTF RESOURCES
2
2
CTF RESOURCES - PLAY
• https://www.ctftime.org
• https://www.cybertalents.com
• https://www.hackthebox.eu
• https://www.amanhardikar.com/mindmaps/Practice.html
• https://www.vulnhub.com
• https://www.root-me.org
• https://www.certifiedsecure.com
• http://www.wechall.net
• https://www.ctflearn.com
• https://www.ringzer0team.com
• https://exploit-exercises.com
23
CTF RESOURCES - LEARN
• https://trailofbits.github.io/ctf/index.html
• http://www.openctf.com/html/firstctf.html
• http://www.pentesteracademy.com
• http://www.opensecuritytraining.info/Training.html
• https://web.stanford.edu/class/cs253
• CyberTalents Webinars
• Web Application Penetration Testing Course
24
THANKYOU!
Omarmfathy219@gmail.Com
Linkedin.com/in/omarmfathy219

More Related Content

Similar to Capture The Flag

Play,Learn and Hack- CTF Training
Play,Learn and Hack- CTF TrainingPlay,Learn and Hack- CTF Training
Play,Learn and Hack- CTF Training
Heba Hamdy Farahat
 
Who needs iot security?
Who needs iot security?Who needs iot security?
Who needs iot security?
Justin Black
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
EC-Council
 
13 Things to Look for in a Token Project by Edith Yeung
13 Things to Look for in a Token Project by Edith Yeung13 Things to Look for in a Token Project by Edith Yeung
13 Things to Look for in a Token Project by Edith Yeung
Edith Yeung
 
Caputre the flag
Caputre the flagCaputre the flag
Caputre the flag
UIT
 
Secure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongSecure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongbryns
 
Topcoder Reflections: Observations from a Decade of Crowdsourcing with the Pu...
Topcoder Reflections: Observations from a Decade of Crowdsourcing with the Pu...Topcoder Reflections: Observations from a Decade of Crowdsourcing with the Pu...
Topcoder Reflections: Observations from a Decade of Crowdsourcing with the Pu...
Epi Ludvik Nekaj 宇 赫
 
Topcoder Reflections: Observations from a Decade of Crowdsourcing with the Pu...
Topcoder Reflections: Observations from a Decade of Crowdsourcing with the Pu...Topcoder Reflections: Observations from a Decade of Crowdsourcing with the Pu...
Topcoder Reflections: Observations from a Decade of Crowdsourcing with the Pu...
Crowdsourcing Week
 
A closer look at CTF challenges
A closer look at CTF challengesA closer look at CTF challenges
A closer look at CTF challenges
DNIF
 
How to build corporate size fraud prevention
How to build corporate size fraud preventionHow to build corporate size fraud prevention
How to build corporate size fraud prevention
Yury Leonychev
 
Are You Trading Stocks Securely? Exposing Security Flaws in Trading Technologies
Are You Trading Stocks Securely? Exposing Security Flaws in Trading TechnologiesAre You Trading Stocks Securely? Exposing Security Flaws in Trading Technologies
Are You Trading Stocks Securely? Exposing Security Flaws in Trading Technologies
Alejandro Hernández
 
Adversary Driven Defense in the Real World
Adversary Driven Defense in the Real WorldAdversary Driven Defense in the Real World
Adversary Driven Defense in the Real World
James Wickett
 
The hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsThe hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignments
n|u - The Open Security Community
 
Evading & Bypassing Anti-Malware applications using metasploit
Evading & Bypassing Anti-Malware applications using metasploitEvading & Bypassing Anti-Malware applications using metasploit
Evading & Bypassing Anti-Malware applications using metasploit
n|u - The Open Security Community
 
Centralized Crypto Exchange Development Challenges
Centralized Crypto Exchange  Development  ChallengesCentralized Crypto Exchange  Development  Challenges
Centralized Crypto Exchange Development Challenges
Tess Casali
 
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for DefenseSANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
John Bambenek
 
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
ITCamp
 
Introduction of CTF and CGC
Introduction of CTF and CGCIntroduction of CTF and CGC
Introduction of CTF and CGC
Kir Chou
 
Cyber Security Workshop Presentation.pptx
Cyber Security Workshop Presentation.pptxCyber Security Workshop Presentation.pptx
Cyber Security Workshop Presentation.pptx
YashSomalkar
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovations
Lexume1
 

Similar to Capture The Flag (20)

Play,Learn and Hack- CTF Training
Play,Learn and Hack- CTF TrainingPlay,Learn and Hack- CTF Training
Play,Learn and Hack- CTF Training
 
Who needs iot security?
Who needs iot security?Who needs iot security?
Who needs iot security?
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
 
13 Things to Look for in a Token Project by Edith Yeung
13 Things to Look for in a Token Project by Edith Yeung13 Things to Look for in a Token Project by Edith Yeung
13 Things to Look for in a Token Project by Edith Yeung
 
Caputre the flag
Caputre the flagCaputre the flag
Caputre the flag
 
Secure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongSecure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrong
 
Topcoder Reflections: Observations from a Decade of Crowdsourcing with the Pu...
Topcoder Reflections: Observations from a Decade of Crowdsourcing with the Pu...Topcoder Reflections: Observations from a Decade of Crowdsourcing with the Pu...
Topcoder Reflections: Observations from a Decade of Crowdsourcing with the Pu...
 
Topcoder Reflections: Observations from a Decade of Crowdsourcing with the Pu...
Topcoder Reflections: Observations from a Decade of Crowdsourcing with the Pu...Topcoder Reflections: Observations from a Decade of Crowdsourcing with the Pu...
Topcoder Reflections: Observations from a Decade of Crowdsourcing with the Pu...
 
A closer look at CTF challenges
A closer look at CTF challengesA closer look at CTF challenges
A closer look at CTF challenges
 
How to build corporate size fraud prevention
How to build corporate size fraud preventionHow to build corporate size fraud prevention
How to build corporate size fraud prevention
 
Are You Trading Stocks Securely? Exposing Security Flaws in Trading Technologies
Are You Trading Stocks Securely? Exposing Security Flaws in Trading TechnologiesAre You Trading Stocks Securely? Exposing Security Flaws in Trading Technologies
Are You Trading Stocks Securely? Exposing Security Flaws in Trading Technologies
 
Adversary Driven Defense in the Real World
Adversary Driven Defense in the Real WorldAdversary Driven Defense in the Real World
Adversary Driven Defense in the Real World
 
The hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsThe hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignments
 
Evading & Bypassing Anti-Malware applications using metasploit
Evading & Bypassing Anti-Malware applications using metasploitEvading & Bypassing Anti-Malware applications using metasploit
Evading & Bypassing Anti-Malware applications using metasploit
 
Centralized Crypto Exchange Development Challenges
Centralized Crypto Exchange  Development  ChallengesCentralized Crypto Exchange  Development  Challenges
Centralized Crypto Exchange Development Challenges
 
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for DefenseSANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
 
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
 
Introduction of CTF and CGC
Introduction of CTF and CGCIntroduction of CTF and CGC
Introduction of CTF and CGC
 
Cyber Security Workshop Presentation.pptx
Cyber Security Workshop Presentation.pptxCyber Security Workshop Presentation.pptx
Cyber Security Workshop Presentation.pptx
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovations
 

More from Omar Fathy

Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Omar Fathy
 
Cloud Run and Containers
Cloud Run and ContainersCloud Run and Containers
Cloud Run and Containers
Omar Fathy
 
GitOps and ArgoCD
GitOps and ArgoCDGitOps and ArgoCD
GitOps and ArgoCD
Omar Fathy
 
DevOps! What, Why and How?
DevOps! What, Why and How?DevOps! What, Why and How?
DevOps! What, Why and How?
Omar Fathy
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Omar Fathy
 
Google Cloud Fundamentals
Google Cloud Fundamentals Google Cloud Fundamentals
Google Cloud Fundamentals
Omar Fathy
 
Introduction to Git and GitHub Part 2
Introduction to Git and GitHub Part 2Introduction to Git and GitHub Part 2
Introduction to Git and GitHub Part 2
Omar Fathy
 
Introduction to Git and GitHub Part 1
Introduction to Git and GitHub Part 1Introduction to Git and GitHub Part 1
Introduction to Git and GitHub Part 1
Omar Fathy
 

More from Omar Fathy (8)

Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Cloud Run and Containers
Cloud Run and ContainersCloud Run and Containers
Cloud Run and Containers
 
GitOps and ArgoCD
GitOps and ArgoCDGitOps and ArgoCD
GitOps and ArgoCD
 
DevOps! What, Why and How?
DevOps! What, Why and How?DevOps! What, Why and How?
DevOps! What, Why and How?
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Google Cloud Fundamentals
Google Cloud Fundamentals Google Cloud Fundamentals
Google Cloud Fundamentals
 
Introduction to Git and GitHub Part 2
Introduction to Git and GitHub Part 2Introduction to Git and GitHub Part 2
Introduction to Git and GitHub Part 2
 
Introduction to Git and GitHub Part 1
Introduction to Git and GitHub Part 1Introduction to Git and GitHub Part 1
Introduction to Git and GitHub Part 1
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

Capture The Flag

  • 2. 2 Omar Mohamed Fathy Front-End Developer @ CyberTalents
  • 3. AGENDA • How to earn money from bugs? • What is Bug bounty Program? • What is CTF Competitions? • Types of Challenges • What are Flags? • What is the write-up? • Who can play in the CTF? • CTF Competitions in Egypt • Demo... • CTF Resources 3
  • 4. How to Earn Money From Bugs? 4
  • 6. 6
  • 8. 8
  • 9. CTF COMPETITIONS • Capture the Flag ( CTF) is an information security competition • where participants demonstrate their technical ability. • Jeopardy: Participants try to solve various challenges in different • categories. Participants get points for every challenge they solve, • the team with the highest number of points will be the winner. • Attack and Defense: Participants attack other contestants while • defending their own network/system, the team who was able to • attack other team and defend his system will be the winner. 9
  • 11. WHAT IS CHALLENGE? • Challenges are the questions that you have to solve to get points. • Every Challenge has a description, Difficulty level, category and number of points to solve. 11
  • 12. TYPES OF CHALLENGES • Network Security • Web Security • Malware Reverse Engineering • Digital Forensics • Cryptography • General Knowledge • Others 12
  • 14. WHAT ARE FLAGS? • Some sort of text/MD5 hash that you submit to CTF portal to get • the challenge points. • e.g. of flags : b1a1f2855d2428930e0c9c3ce10600d6 • flag{I_am_the_key}. 14
  • 16. WHAT ISTHE WRITEUP • This is a document or article describing the solution of a certain • challenge. • Reading write-ups is one of the main ways to get introduced to • CTFs. 16
  • 17. WHO CAN PLAY INTHE CTF? 1 7
  • 18. WHO CAN PLAY INTHE CTF? • Anyone can play CTF, However each category need a set of skills : • Development Skills, Network Skills, Web development skills. • Problem Solving Skills. • Patience and keep trying mentality. 18
  • 20. CTF COMPETITIONS IN EGYPT • EGYPT CYBER SECURITY NATIONAL CTF CyberTalents • CyberWar Games 20
  • 23. CTF RESOURCES - PLAY • https://www.ctftime.org • https://www.cybertalents.com • https://www.hackthebox.eu • https://www.amanhardikar.com/mindmaps/Practice.html • https://www.vulnhub.com • https://www.root-me.org • https://www.certifiedsecure.com • http://www.wechall.net • https://www.ctflearn.com • https://www.ringzer0team.com • https://exploit-exercises.com 23
  • 24. CTF RESOURCES - LEARN • https://trailofbits.github.io/ctf/index.html • http://www.openctf.com/html/firstctf.html • http://www.pentesteracademy.com • http://www.opensecuritytraining.info/Training.html • https://web.stanford.edu/class/cs253 • CyberTalents Webinars • Web Application Penetration Testing Course 24