Introduction CTF and Implementation for Industry

University Bhayangkara Jakarta Raya
Sun, Dec 19, 2021, 4:00 PM (WIB)

Check out what happened

About this event

The “attacking” team in cybersecurity exercises is known as a Red Team. Their job is to adopt the methods and simulate the kinds of attacks that actual adversaries might use against an organization. The defenders in these scenarios are the Blue Team. The point of conducting red team/blue team exercises is to improve the security posture of the organization, not to cause actual damage. Related terms include “offensive security” (again, implying an attacking posture) and “pen test” (attempting to penetrate computer or cybersecurity defenses).

CTF events have evolved from a children’s game where teams invade each other’s territory and attempt to capture and bring back the other team’s flag. In the area of cybersecurity, CTFs have become competitions to demonstrate expertise in attacking (or defending) computer resources. The flag in this context is typically a file or code a team recovers and provides as proof of their successful penetration of defenses.

The essence of a CTF is puzzle solving. The challenges are created by and for people who like solving puzzles. One aspect potentially frustrating to beginners is that the goal of the challenge may not be spelled out. Take that in stride. If the challenge provides an IP address and a port, try connecting to it using a simple tool such as telnet or NetCat. See what you can figure out. Every challenge has an intended solution.

Types Of Challenges

Here are some common types of challenges you might encounter in a CTF:

RCE – (Remote Code Execution) – Exploiting a software vulnerability to allow executing code on a remote server.

Cryptography – Solving ciphers and code, ranging from classic ciphers (e.g., Caesar, transposition) to modern cryptography such as AES, 3DES, RC4, and Twofish.

Programming – Challenges that will require coding a solution in the computer language of your choice. Solving these manually would generally be too tedious or time-consuming.

OSINT (Open Source Intelligence) – Finding clues hidden on the public internet and social media platforms. Bring your best Google-fu to tackle these.

Reverse engineering – Studying a binary executable, malware sample, or other files to understand its intent or behavior.

Forensics – Analyzing log files, network packet captures or other artifacts to detect how a hacker infiltrated a system.

Steganography – The art and science of hiding (and detecting) messages in images, audio files, and the like.


Partner