Address
304 North Cardinal St.
Dorchester Center, MA 02124
Work Hours
Monday to Friday: 7AM - 7PM
Weekend: 10AM - 5PM
Address
304 North Cardinal St.
Dorchester Center, MA 02124
Work Hours
Monday to Friday: 7AM - 7PM
Weekend: 10AM - 5PM
Want to learn more about capture the flag hacking competitions? Don’t even know what CTF stands for? Or just want to know how to win a ton of awesome prices and knowledge? If so, then you are in the right place!
Capture the Flag hacking competitions are usually a set of challenges or targets that you have to solve or break into to capture “flags”. These flags are usually a formatted text string that you can submit to a portal or dashboard and earn points. At the end of the event, the points are tallied up, winners declared, and often prizes awarded!
CTF (Capture the Flag) competitions are personally my FAVORITE way to learn about information security.
If you’re still interested, then let’s jump deeper into the world of Cybersecurity CTF competitions!
CTF competitions are, at their core, an information security competition.
Capture the Flag (CTF) competitions are generally on information security topics with challenges, winners, and sometimes even prizes!
They are often a series of challenges or computers to attack and defend. Note that these competitions can be team or individual-based, depending on the event.
There are a few different styles of capture the flag events, but most are either Jeopardy-style or attack-defense.
Jeopardy-style is what you are most likely familiar with. This is where there is a scoreboard (like Jeopardy) with specific challenges or requirements to earn the points. On the other hand, attack-defense is where you are actively attacking and defending several hosts. The most common examples of this are the National Cyber League or CCDC.
While the challenges will vary from CTF to CTF, you will usually run into some combination of web applications, cryptography, steganography, binary analysis, and more.
Capture the flag hacking competitions range in difficulty from unfamiliar to computers to the best hackers in the world.
To participate in a CTF, just enter them! While that is simpler than it sounds, you can find them year-round at CTFtime. Other than that, most conferences that you go to will have some form of CTF.
If you’ve never participated in a CTF before, consider talking to the organizers. If they are not too busy, they are likely to help you out. The people putting on CTFs want you to learn and have fun as much as you do! While you may not win some prizes, you may learn some new attacks or techniques for future CTFs.
I mean, the primary motivation for CTF competitions is fame and fortune, right?
Joking aside, I have won several prizes from various CTF competitions. You can win a “black badge” which gives you free entry to that conference for life. Other than that, I’ve won Amazon gift cards, security-related books, and various hacking gadgets and tools.
Other than the prizes that you can win, CTF competitions are the closest you can get to real hacking or penetration testing. This allows you to gain experience with real-world tools, hone your existing skills, or learn new ones.
In addition to skills, there are the elements of competition and networking, which are great for your career or motivation in general.
Finally, several security-related positions use capture the flag hacking scenarios as part of their interview process. If you want to get into offensive security, then this needs to be something you are ready for.
Other than online and in-person, conferences are the best place to find CTF events.
I touched on them briefly above but wanted to go a little more in-depth.
There is usually at least one capture the flag competition at every InfoSec conference, and sometimes a lot more than that.
First of all, my favorite conference AND CTF was DerbyCon, but that’s unfortunately gone forever.
You should also check out all of the different DEF CON CTFs, as I’ve personally competed in a lot of different ones. You can find defensive, forensic, wireless, or standard capture the flag events somewhere at DEF CON.
Last, but not least, don’t neglect your local or smaller conferences. That BSides near you might just have the most fun CTF you’ve seen!
If you JUST want some CTF resources, then this is the section for you.
Note that this section will be an ENORMOUS link dump, but hopefully most/all of them will be useful.
I plan on keeping this as a living post, and I will be sure to mention it when I make major updates. If you have any additions, subtractions, or comments, then please feel free to share. Note that some of these links point to a page of more links, this is just to prevent duplication of work where possible.
Additionally, this will allow me to remove all of my CTF bookmarks other than this post! Finally, huge bonus points to anyone who gets my reference in the title of this post.
Without further adieu, here are my CTF resources.
In addition to the more specific write-ups above, there are some tools or techniques that can help a ton.
Hopefully, some of these will help you go out and win some CTF competitions!
(or at least come in second)
After winning our black badge, BSides Raleigh 2016 asked @claytondorsey and I to speak. We decided to talk about CTFs in general, and try to motivate people to take part in them. Unfortunately, our employer pulled our talk at the last minute.
Fast-forward to 2017, and CarolinaCon 13 accepted our CFP submission (for the same talk)!
The first conference that we gave our talk at was CarolinaCon 13.
This was the first conference talk for either Clayton or me, but it went well.
The talk went great, and we got plenty of good feedback.
I even shared some of my secrets/passwords with some of the crowd! Thankfully Curbob edited these out of the video, but lesson learned.
Some people even joined the CTF because of our talk, which was a great feeling.
If you want, you can download our slide-deck (.pptx) here.
Also, thanks to Curbob, you can find us on Youtube!
The second conference that presented at was BSidesMCR 2017.
This was still my second talk ever, but, unfortunately, Clayton was unable to make it out to this one.
While it took some asking and permission slips, work agreed to send me to England for this presentation! My travel time was pretty long, as I had a 9-hour layover in each direction.
I won’t repost everything from my review of the conference itself, but this was a great opportunity.
For this talk, I updated our slide-deck to use a Secureworks branded template.
It was great presenting to an international crowd, and there were a ton of great questions and suggestions.
The rooms themselves were also auditorium-style seating, so I got to practice in front of a bigger crowd as well!
I came away with even more ideas for our talk after this one, which was good. In addition to that, some of the questions helped me think about ideas for our actual CTF.
In addition to my talk, I also had a co-worker presenting at the conference as well. He was selected to talk there before me, which helped both of us get approved by work.
Eric was giving a talk on “Hacking Wireless Home Security Systems”, which was pretty awesome. It inspired me to build a DIY security system. I haven’t finished (or started) yet, but once I do I’ll blog about it.
No slides, but you can find Eric’s talk on Youtube as well!
We also managed to win a 3D Printer, but most of that story is on my original post about the conference.
If you want to follow its (now idle) antics, then you can always follow it on Twitter!
Finally, if you want, you can download our updated slide-deck (.pptx) here.
Just like CarolinaCon, my talk was also recorded here.
Finally, I also presented at BSides Raleigh 2017.
Originally, we submitted the same talk, but there was a slight conflict with Jordan’s submission.
In the end, we decided to combine the two talks into one mega panel!
This panel went great, and all of EverSec was able to be on stage and contribute.
We got tons of good questions, ideas, and real interest in CTFs. Hopefully, we were able to convince some people to go out and play (or run) CTFs.
There were no slides, but I will share the video if it ever gets posted.
While this was a longer navigation post, I wanted to share as much as I could about CTF competitions.
If you still don’t know where to get started with capture the flag hacking, then I’m not sure if I can help you!
Let me know if you still have any questions about CTFs, or if there are any resources that you’d like me to add.
Ray Doyle is an avid pentester/security enthusiast/beer connoisseur who has worked in IT for almost 16 years now. From building machines and the software on them, to breaking into them and tearing it all down; he’s done it all. To show for it, he has obtained an OSCE, OSCP, eCPPT, GXPN, eWPT, eWPTX, SLAE, eMAPT, Security+, ICAgile CP, ITIL v3 Foundation, and even a sabermetrics certification!
He currently serves as a Senior Staff Adversarial Engineer for Avalara, and his previous position was a Principal Penetration Testing Consultant for Secureworks.
This page contains links to products that I may receive compensation from at no additional cost to you. View my Affiliate Disclosure page here. As an Amazon Associate, I earn from qualifying purchases.
[…] than capture the flag events, vulnerable machines or labs are a great way to learn some ethical hacking tools and […]