
A Capture-the-Flag (CTF) is a very popular format for cybersecurity competitions that will present individuals (or teams) with on-line challenges. CTFs typically use a ‘Jeopardy’ style format that has categorized questions with different point values (refer to Basic Cyber Competition Skill Domains for potential categories). Below are some ‘Cyber Competition Tips’ :
Cyber CTF Competition Tips:
- Build a Personal Cyber Lab
- Create a personal cyber lab with required software pre-installed (Kali Linux), wifi enabled and key websites bookmarked.
- Review the Basic Cyber Competition Skill Domains for suggested tools to pre-install and websites to bookmark.
- Practice
- Practice entry-level challenges using CTF portals (e.g., picoCTF, overthewire/bandit, etc.)
- Use web search engine (i.e., Google) to find articles and videos walking through how the challenges are solved (e.g., picoCTF write-up beginner challenges, overthewire bandit wakthrough , etc)
- Stay Organized
- Keep a notepad (or document) open to copy key data (e.g., file names, commands, passwords, flags, etc,) for quick reference.
- Create folders to keep copies of files for quick reference
- Prioritize and Watch the Clock !
- Look at the categories and point values – indication of difficulty level.
- Focus on categories that you have expertise in first.
- Read Carefully and Look for Hints :
- The challenge name is almost always a hint – google category name
- Read the challenge carefully – google category and keywords
- Determine the Challenge Type:
- Refer to Basic Cyber Competition Skill Domains for examples of general categories and links to reference information.
- Is There a File ?
- filename or extension may be a hint.
- Run ‘file [filename]‘ to determine file type and next steps (e.g., text, executable, image, zip, etc.)
- Understand how to use Basic Linux Commands like ‘file‘, ‘cat‘, ‘strings’, ‘gzip’, ‘chmod’, ‘grep’, ‘cmp’, ‘sort’, and ‘mount’.
- Use a hex editor like hexed.it or other steganography tools to find hidden data in image file. Refer to Steganography Skills for more info on image files.
- Use ‘chmod +x [filename]‘ to make the file executable. Refer to Enumeration and Exploitation Skills for executable files.
- Watch for Case Sensitivity
- Most of the cyber tools and challenge responses are case sensitive
- Keep it Moving and have Fun!
- Don’t get stuck or frustrated.
- Reflect after you are done
- What were your lessons learned ?
- What did you enjoy ?
- What do you want to work on ?