└── README.md /README.md: -------------------------------------------------------------------------------- 1 | # How-to-Start-CTF-from-Scratch?? 2 | 3 | 4 | 5 |

Prerequisite for CTF!!

6 |
  7 | 1. Basics of Computer.
  8 | 2. Basics of Operating System(Mainly Linux OS and Shell)
  9 | 
10 | 11 | [Linux Basic Commands](https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/) 12 | 13 |
 14 | 3. Moderate Debugging Skills.
 15 | 4. Basics of Networking and Computer Security.
 16 | 
17 | 18 | [Networking Basics](https://www.cisco.com/c/en_in/solutions/small-business/resource-center/networking/networking-basics.html) 19 | 20 |
 21 | 5. Programming Language(Basic C/C++) and Python Scripting Language.
 22 | 6. Basics Understanding of Cryptography(Encryption/Decryption).
 23 | 7. Knowledge of Binary, HexaDecimal, ASCII, Hexdump and Others Representation of Computer Data.
 24 | 
25 | 26 | 27 |

What is CTF??

28 |
 29 | Capture The Flag(CTF) is a special kind of Security Competitions. There are Three common type of CTFs:
 30 |  1) Jeopardy
 31 |  2) Attack and Defence CTF
 32 |  3) Mixed CTF
 33 | In CTF Basically Flag is Special kind of "STrinG" which have to find for points.
 34 | 
35 | 36 | [CTFTime](https://ctftime.org/ctf-wtf/)
37 | 38 | 39 | 40 |

Different Categories of CTF Challenges

41 | 42 | 1. Binary Explotation 43 | * pwn 44 | 2. Reversing 45 | 3. Web 46 | 4. Forensic 47 | * Stegnography 48 | 5. Miscellaneous 49 | 6. OS 50 | * Linux 51 | 7. RecOn/Scripting
52 | 53 | [LiveOverFlow Video](https://www.youtube.com/watch?v=8ev9ZX9J45A)
54 | 55 | 56 |

1.Binary Exploitation

57 | 58 | Binary exploitation is the process of subverting a compiled application such that it violates some trust boundary in a way
that is advantageous to you, the attacker. In this module we are going to focus on memory corruption. By abusing
vulnerabilities that corrupt memory in software we can often rewrite critical application state information in a way that
allows us to elevate privileges inside the context of a particular application (like a remote desktop server) or perform arbitrary computation by hijacking control flow and running code of our choosing.
59 | 60 |
Folllow Below Links for Binary Exploitation
61 | 62 | 1. [LiveOverFlow](https://www.youtube.com/watch?v=iyAyN3GFM7A&list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN) 63 | 2. [GitHub](https://trailofbits.github.io/ctf/exploits/binary1.html) 64 | 3. [RPISEC](http://security.cs.rpi.edu/courses/binexp-spring2015/) 65 | 4. [pwn](https://ctf101.org/reverse-engineering/what-is-assembly-machine-code/#examples) 66 | 5. [micro](https://microcorruption.com/login) 67 | 68 | 69 |

2.Reversing

70 | 71 | Reverse Engineering in a CTF is typically the process of taking a compiled (machine code, bytecode) program and converting it back into a more human readable format.
72 | 73 | Very often the goal of a reverse engineering challenge is to understand the functionality of a given program such that you can identify deeper issues. 74 | 75 |
Folllow Links of Binary Exploitation
76 | 77 |

3.Web

78 | 79 | 80 | In Web Challenge Basically We have to Exploit Vulnerability in Protocol or Langauge, like **PHP** and **xml** OR We have to
take Control Over **HTTP** Requests which is to Server or From Server, But It is very Brief About CTF Web Challenges. 81 | 82 |
Follow Below Links for More Information
83 | 84 | 1. [WebLiveOverFlow](https://www.youtube.com/watch?v=jmgsgjPn1vs&list=PLhixgUqwRTjx2BmNF5-GddyqZcizwLLGP) 85 | 2. [GitHub](https://github.com/orangetw/My-CTF-Web-Challenges) 86 | 3. [Payloads](https://github.com/swisskyrepo/PayloadsAllTheThings/) 87 | 88 | 89 |

4.Forensic

90 | 91 | Forensics is a broad CTF category that does not map well to any particular job role in the security industry, although some challenges model the kinds of tasks seen in Incident Response (IR). Even in IR work, computer forensics is usually
the domain of law enforcement seeking evidentiary data and attribution, rather than the commercial incident
responder who may just be interested in expelling an attacker and/or restoring system integrity.,br> 92 | 93 |
Follow Below Links for More Information
94 | 95 | 1. [Forensic](https://trailofbits.github.io/ctf/forensics/) 96 | 2. [dog-stege](https://github.com/ctfs/write-ups-2014/tree/master/plaid-ctf-2014/doge-stege) 97 | 3. [Hidden](https://ctfs.github.io/resources/topics/steganography/invisible-text/README.html) 98 | 99 | 100 | 101 |

5.Miscellaneous

102 | 103 | Many challenges in CTFs will be completely random and unprecedented, requiring simply logic, knowledge, and patience to be solved. There is no sure-fire way to prepare for these, but as you complete more CTFs you will be able to recognize and hopefully have more clues on how to solve them.
104 | 105 |
Follow Below Links for More About Misc. Challenges
106 | 107 | 1. [Misc](https://ctfs.github.io/resources/topics/miscellaneous/README.html) 108 | 2. [miSC](https://github.com/ctfs/write-ups-2014/tree/master/olympic-ctf-2014/crypting) 109 | 110 | 111 |

6.OS/LinUx

112 | 113 | Basically This Challenges about of, Basic upto Advanced Level of **Enumeration** of Operating System Mainly Linux and its Shell. 114 | 115 | 116 |

7.Cryptography

117 | 118 | In the case of CTFs, the goal is usually to crack or clone cryptographic objects or algorithms to reach the flag. 119 | 120 |
Follow Below Links for More Information about Crypto.
121 | 122 | 1. [Crypt](https://ctfs.github.io/resources/topics/cryptography/README.html) 123 | 2. [Cryptii](https://cryptii.com/) 124 | 3. [Dec0de](https://www.dcode.fr/) 125 | 126 | 127 |

8.RecOn/Scripting

128 | 129 | In this Challenges basically flag is hidden in Social Media Platform, and In Scripting Challenges You have to write script
which Automatically does Tasks. 130 | 131 | 132 |

Below Are Useful Links of Platforms For Beginners's CTF Challenges Practice

133 | 134 | 1. [HackThisSite](https://hackthissite.org/) 135 | 2. [Overthewire](http://overthewire.org/wargames/) 136 | 3. [HackTheBox](https://www.hackthebox.eu/) 137 | 4. [VulnHub](https://www.vulnhub.com/) 138 | 5. [PenTesterLab](https://pentesterlab.com/) 139 | 6. [HackThis](https://www.hackthis.co.uk/)
140 | 7. [ShelterLabs](https://shellterlabs.com/pt/)
141 | 8. [rOOtMe](https://www.root-me.org/)
142 | 9. [Zenk](https://www.zenk-security.com/epreuves.php)
143 | 10. [w3challs](https://w3challs.com/)
144 | 11. [newbieContest](https://www.newbiecontest.org/)
145 | 12. [picoCTF](https://picoctf.com/)
146 | 13. [pwnable](https://pwnable.kr/play.php)
147 | 148 | 149 | 150 |

ThanKs a Lot!! AND Good Luck All Beginners for CTF

151 | 152 | 153 | 154 | 155 | 156 | 157 | 158 | 159 | 160 | --------------------------------------------------------------------------------