Capture The Flag 101: Difference between revisions
From ICO wiki
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 7: | Line 7: | ||
===Network=== | ===Network=== | ||
===Steganography=== | ===Steganography=== | ||
Steganography is the art of hiding information in ways that prevent the detection of hidden messages. It includes a vast array of secret communications methods that conceal the message's very existence. These methods include invisible inks, microdots, character arrangement, digital signatures, covert channels, and spread spectrum communications. <ref>IEEE (1998) Available at:https://ieeexplore.ieee.org/abstract/document/4655281 Accessed 01-05-2021</ref> | |||
===Web=== | ===Web=== | ||
===SQL Injections=== | ===SQL Injections=== | ||
==Conclusion== | ==Conclusion== | ||
==References== | ==References== | ||
<references /> |
Revision as of 15:12, 1 May 2021
This wiki page will help you better understand the basics of CTF's.
What is Capture the Flag?
Types of challenges
Binary Analysis
PWN
Network
Steganography
Steganography is the art of hiding information in ways that prevent the detection of hidden messages. It includes a vast array of secret communications methods that conceal the message's very existence. These methods include invisible inks, microdots, character arrangement, digital signatures, covert channels, and spread spectrum communications. [1]
Web
SQL Injections
Conclusion
References
- ↑ IEEE (1998) Available at:https://ieeexplore.ieee.org/abstract/document/4655281 Accessed 01-05-2021