Skip to content

Commit 4657a2e

Browse files
Merge pull request #46 from kossiitkgp/update-task/ctf
update(teaching): update capture_the_flag task to include pwning
2 parents a12c1dd + 062a674 commit 4657a2e

File tree

1 file changed

+69
-17
lines changed

1 file changed

+69
-17
lines changed
Lines changed: 69 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,55 @@
11
# Introduction to Capture the Flag (CTF) competitions
22

3-
## Background:
4-
Capture the Flag (CTF) is a type of cybersecurity competition that involves a series of challenges designed to test the skills and knowledge of participants in various areas of cybersecurity. These competitions simulate real-world cyber attack and defense scenarios, providing participants with hands-on experience in a safe and controlled environment. CTF competitions are becoming increasingly popular among cybersecurity professionals, students, and enthusiasts as they offer an exciting and challenging way to learn new skills and showcase existing ones.
3+
## Background:
4+
Capture the Flag (CTF) is a type of cybersecurity competition
5+
that involves a series of challenges designed to test the skills and knowledge
6+
of participants in various areas of cybersecurity. These competitions simulate
7+
real-world cyber attack and defense scenarios, providing participants with
8+
hands-on experience in a safe and controlled environment. CTF competitions are
9+
becoming increasingly popular among cybersecurity professionals, students, and
10+
enthusiasts as they offer an exciting and challenging way to learn new skills
11+
and showcase existing ones.
512

613
## What you need to do:
714

8-
As part of this task, you will need to create a simple presentation that introduces the concept of Capture the Flag (CTF) competitions to a group of beginners. Your presentation should cover the following topics:
15+
As part of this task, you will need to create a simple presentation that
16+
introduces the concept of Capture the Flag (CTF) competitions and basic
17+
principles of reverse engineering and pwning to a group of beginners. Your
18+
presentation should cover the following topics:
919

1020
1. Introduction to cybersecurity and hacking
11-
2. Briefly explain the basics of cybersecurity and the concept of hacking
12-
3. Describe different types of cyber threats and their impact on organizations
13-
4. Overview of Capture the Flag (CTF) competitions
14-
5. Explain what CTF competitions are and how they work
15-
6. Briefly describe about different types of challenges that participants may encounter in CTF competitions
16-
7. Describe in detail about the Reverse Engineering type of challenges
17-
8. Common tools and techniques used in CTF competitions
18-
9. Describe some of the common tools and techniques that participants may use for solving Reverse Engineering challenges
19-
10. Try to solve a Reverse Engineering challenge from the internet using the techniques that you have learnt and describe the process
20-
21-
Please create a presentation, either using PPT or preferably an Open Source tool such as [RevealJS](https://revealjs.com/). The interviewee needs to keep in mind that the crowd he will be presenting to, will have mixed people of different knowledge levels, so it is advised that to keep the content balanced for all. Keep it short, to less than 20 slides or so, and you could include images, screenshots from commands run, and short snippets of code, to keep the audience interested.
21+
1. Briefly explain the basics of cybersecurity and the concept of hacking
22+
1. Briefly describe different types of cyber threats and their impact on organizations
23+
1. Overview of Capture the Flag (CTF) competitions (jeopardy format)
24+
1. Explain what CTF competitions are and how they work
25+
1. Briefly describe about different types of challenges that participants may
26+
encounter in CTF competitions
27+
1. Common tools and techniques used in CTF competitions
28+
1. Describe in detail about the Reverse Engineering type of challenges. Include at least the following
29+
- What are Reverse Engineering challenges?
30+
- What are the tools used to solve such challenges?
31+
- (Optional) Discuss Python and Rust reverse engineering challenges and techniques as well
32+
1. Describe in detail about Pwning challenges. Include at least the following
33+
- What is pwning?
34+
- What are the common vulnerabilities exploited to pwn a system (binary exploitation)?
35+
- (Optional) Discuss shellcodes for solving Reverse Engineering challenges
36+
1. Try out one Reverse Engineering and one Pwning challenge from the internet,
37+
and describe your solutions in detail. Document your CTF writeups in markdown
38+
files (`.md`). You are encouraged to create a github repo for this
39+
40+
> [!NOTE]
41+
> We know that this task involves learning about many concepts, so we do
42+
> not expect you to become masters in just a couple of days. We want to see
43+
> what you've explored, the effort you've put into this, and how you overcame
44+
> any hurdles.
45+
46+
Please create a presentation, either using PPT or preferably an Open Source
47+
tool such as [RevealJS](https://revealjs.com/). The interviewee needs to keep
48+
in mind that the crowd he will be presenting to, will have mixed people of
49+
different knowledge levels, so it is advised that to keep the content balanced
50+
for all. Keep it short, to less than 20 slides or so, and you could include
51+
images, screenshots from commands run, and short snippets of code, to keep the
52+
audience interested.
2253

2354
## Some resources:
2455

@@ -27,15 +58,36 @@ Please create a presentation, either using PPT or preferably an Open Source tool
2758
- [CTFtime](https://ctftime.org/)
2859
- [TryHackMe](https://tryhackme.com/)
2960
- [HackTheBox](https://www.hackthebox.eu/)
61+
- [pwnable.tw: pwning challenges](https://pwnable.tw/challenge/)
62+
- [ir0nstone's notes](https://ir0nstone.gitbook.io/notes)
63+
- [KOSSCTF 2025: CTF Workshop by KOSS](https://github.com/kossiitkgp/KossCTF-2025)
3064

3165
## Learning from the task:
3266

33-
This task is designed to introduce beginners to the concept of Capture the Flag (CTF) competitions and provide them with an overview of the skills and knowledge required to participate in such competitions. By completing this task, you will:
67+
This task is designed to introduce beginners to the concept of Capture the Flag
68+
(CTF) competitions and provide them with an overview of the skills and
69+
knowledge required to participate in such competitions. It also intends to
70+
introduce them to concepts of Reverse Engineering and Binary Exploitation. By
71+
completing this task, you will:
3472

3573
- Gain an understanding of the basics of cybersecurity and hacking
36-
- Learn about the different types of challenges that are encountered in CTF competitions
74+
- Learn about the different types of challenges that are encountered in CTF
75+
competitions
3776
- Discover the common tools and techniques used in CTF competitions
77+
- Learn in detail about C/C++ Binaries and their vulnerabilities
78+
- Practice understanding complex code
3879
- Learn strategies for succeeding in CTF competitions
3980
- Explore resources for learning and practicing CTF skills
4081

41-
Note that, don't get lost in the theoretical sea, there are infinite topics in CTFs and Cyber security which are impossible to know, so you should use the rule of thumb to judiciously use your time to maintain a balance of theoretical understanding and practical implementation. We are more curious about your thinking ability and practical utility than the final result. So, don't worry if you are not able to complete the task, just try to do as much as you can and try to learn from the task.
82+
> [!WARNING]
83+
> Note that, don't get lost in the theoretical sea, there are infinite topics in
84+
> CTFs and Cyber security which are impossible to know, so you should use the
85+
> rule of thumb to judiciously use your time to maintain a balance of theoretical
86+
> understanding and practical implementation. We are more curious about your
87+
> thinking ability and practical utility than the final result. So, don't worry
88+
> if you are not able to complete the task, just try to do as much as you can and
89+
> try to learn from the task.
90+
91+
### Further Reading
92+
93+
- [The FLARE On Challenge: real world oriented rev](https://flare-on.com/)

0 commit comments

Comments
 (0)