└── README.md
/README.md:
--------------------------------------------------------------------------------
1 | # How-to-Start-CTF-from-Scratch??
2 |
3 |
4 |
5 |
Prerequisite for CTF!!
6 |
7 | 1. Basics of Computer.
8 | 2. Basics of Operating System(Mainly Linux OS and Shell)
9 |
10 |
11 | [Linux Basic Commands](https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/)
12 |
13 |
14 | 3. Moderate Debugging Skills.
15 | 4. Basics of Networking and Computer Security.
16 |
17 |
18 | [Networking Basics](https://www.cisco.com/c/en_in/solutions/small-business/resource-center/networking/networking-basics.html)
19 |
20 |
21 | 5. Programming Language(Basic C/C++) and Python Scripting Language.
22 | 6. Basics Understanding of Cryptography(Encryption/Decryption).
23 | 7. Knowledge of Binary, HexaDecimal, ASCII, Hexdump and Others Representation of Computer Data.
24 |
25 |
26 |
27 | What is CTF??
28 |
29 | Capture The Flag(CTF) is a special kind of Security Competitions. There are Three common type of CTFs:
30 | 1) Jeopardy
31 | 2) Attack and Defence CTF
32 | 3) Mixed CTF
33 | In CTF Basically Flag is Special kind of "STrinG" which have to find for points.
34 |
35 |
36 | [CTFTime](https://ctftime.org/ctf-wtf/)
37 |
38 |
39 |
40 | Different Categories of CTF Challenges
41 |
42 | 1. Binary Explotation
43 | * pwn
44 | 2. Reversing
45 | 3. Web
46 | 4. Forensic
47 | * Stegnography
48 | 5. Miscellaneous
49 | 6. OS
50 | * Linux
51 | 7. RecOn/Scripting
52 |
53 | [LiveOverFlow Video](https://www.youtube.com/watch?v=8ev9ZX9J45A)
54 |
55 |
56 | 1.Binary Exploitation
57 |
58 | Binary exploitation is the process of subverting a compiled application such that it violates some trust boundary in a way
that is advantageous to you, the attacker. In this module we are going to focus on memory corruption. By abusing
vulnerabilities that corrupt memory in software we can often rewrite critical application state information in a way that
allows us to elevate privileges inside the context of a particular application (like a remote desktop server) or perform arbitrary computation by hijacking control flow and running code of our choosing.
59 |
60 | Folllow Below Links for Binary Exploitation
61 |
62 | 1. [LiveOverFlow](https://www.youtube.com/watch?v=iyAyN3GFM7A&list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN)
63 | 2. [GitHub](https://trailofbits.github.io/ctf/exploits/binary1.html)
64 | 3. [RPISEC](http://security.cs.rpi.edu/courses/binexp-spring2015/)
65 | 4. [pwn](https://ctf101.org/reverse-engineering/what-is-assembly-machine-code/#examples)
66 | 5. [micro](https://microcorruption.com/login)
67 |
68 |
69 | 2.Reversing
70 |
71 | Reverse Engineering in a CTF is typically the process of taking a compiled (machine code, bytecode) program and converting it back into a more human readable format.
72 |
73 | Very often the goal of a reverse engineering challenge is to understand the functionality of a given program such that you can identify deeper issues.
74 |
75 | Folllow Links of Binary Exploitation
76 |
77 | 3.Web
78 |
79 |
80 | In Web Challenge Basically We have to Exploit Vulnerability in Protocol or Langauge, like **PHP** and **xml** OR We have to
take Control Over **HTTP** Requests which is to Server or From Server, But It is very Brief About CTF Web Challenges.
81 |
82 | Follow Below Links for More Information
83 |
84 | 1. [WebLiveOverFlow](https://www.youtube.com/watch?v=jmgsgjPn1vs&list=PLhixgUqwRTjx2BmNF5-GddyqZcizwLLGP)
85 | 2. [GitHub](https://github.com/orangetw/My-CTF-Web-Challenges)
86 | 3. [Payloads](https://github.com/swisskyrepo/PayloadsAllTheThings/)
87 |
88 |
89 | 4.Forensic
90 |
91 | Forensics is a broad CTF category that does not map well to any particular job role in the security industry, although some challenges model the kinds of tasks seen in Incident Response (IR). Even in IR work, computer forensics is usually
the domain of law enforcement seeking evidentiary data and attribution, rather than the commercial incident
responder who may just be interested in expelling an attacker and/or restoring system integrity.,br>
92 |
93 | Follow Below Links for More Information
94 |
95 | 1. [Forensic](https://trailofbits.github.io/ctf/forensics/)
96 | 2. [dog-stege](https://github.com/ctfs/write-ups-2014/tree/master/plaid-ctf-2014/doge-stege)
97 | 3. [Hidden](https://ctfs.github.io/resources/topics/steganography/invisible-text/README.html)
98 |
99 |
100 |
101 | 5.Miscellaneous
102 |
103 | Many challenges in CTFs will be completely random and unprecedented, requiring simply logic, knowledge, and patience to be solved. There is no sure-fire way to prepare for these, but as you complete more CTFs you will be able to recognize and hopefully have more clues on how to solve them.
104 |
105 | Follow Below Links for More About Misc. Challenges
106 |
107 | 1. [Misc](https://ctfs.github.io/resources/topics/miscellaneous/README.html)
108 | 2. [miSC](https://github.com/ctfs/write-ups-2014/tree/master/olympic-ctf-2014/crypting)
109 |
110 |
111 | 6.OS/LinUx
112 |
113 | Basically This Challenges about of, Basic upto Advanced Level of **Enumeration** of Operating System Mainly Linux and its Shell.
114 |
115 |
116 | 7.Cryptography
117 |
118 | In the case of CTFs, the goal is usually to crack or clone cryptographic objects or algorithms to reach the flag.
119 |
120 | Follow Below Links for More Information about Crypto.
121 |
122 | 1. [Crypt](https://ctfs.github.io/resources/topics/cryptography/README.html)
123 | 2. [Cryptii](https://cryptii.com/)
124 | 3. [Dec0de](https://www.dcode.fr/)
125 |
126 |
127 | 8.RecOn/Scripting
128 |
129 | In this Challenges basically flag is hidden in Social Media Platform, and In Scripting Challenges You have to write script
which Automatically does Tasks.
130 |
131 |
132 | Below Are Useful Links of Platforms For Beginners's CTF Challenges Practice
133 |
134 | 1. [HackThisSite](https://hackthissite.org/)
135 | 2. [Overthewire](http://overthewire.org/wargames/)
136 | 3. [HackTheBox](https://www.hackthebox.eu/)
137 | 4. [VulnHub](https://www.vulnhub.com/)
138 | 5. [PenTesterLab](https://pentesterlab.com/)
139 | 6. [HackThis](https://www.hackthis.co.uk/)
140 | 7. [ShelterLabs](https://shellterlabs.com/pt/)
141 | 8. [rOOtMe](https://www.root-me.org/)
142 | 9. [Zenk](https://www.zenk-security.com/epreuves.php)
143 | 10. [w3challs](https://w3challs.com/)
144 | 11. [newbieContest](https://www.newbiecontest.org/)
145 | 12. [picoCTF](https://picoctf.com/)
146 | 13. [pwnable](https://pwnable.kr/play.php)
147 |
148 |
149 |
150 | ThanKs a Lot!! AND Good Luck All Beginners for CTF
151 |
152 |
153 |
154 |
155 |
156 |
157 |
158 |
159 |
160 |
--------------------------------------------------------------------------------