forked from ctfs/resources
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
4c621d2
commit 0f56d3e
Showing
3 changed files
with
39 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
#Miscellaneous | ||
|
||
Many challenges in CTFs will be completely random and unprecedented, requiring simply logic, knowledge, and patience to be solved. There is no sure-fire way to prepare for these, but as you complete more CTFs you will be able to recognize and hopefully have more clues as to how to solve them. | ||
|
||
###Examples | ||
|
||
In recent CTFs the sheer variety of miscellaneous tasks has been highly exemplified, for example: | ||
|
||
* In the [Olympic CTF Sochi 2014](https://ctftime.org/event/130), there was [low-point miscellaneous challenge](https://github.com/ctfs/write-ups/tree/master/olympic-ctf-2014/crypting) which only provided a jumbled string of words. Instead of being a typical crypto challenge, the answer required competitors to draw out the word SOCHI on their keyboards. | ||
* [RuCTF](https://ctftime.org/event/122) had a challenge which presented a [single picture of shredded strips of paper jumpled up in a random order](https://github.com/ctfs/write-ups/tree/master/ructf-2014-quals/misc-100). The best way of solving this was by hand! No computer knowledge was even needed for its completion. | ||
|
||
##Sources/See More | ||
|
||
[CTF Write-Ups](https://github.com/ctfs/write-ups) | ||
|
||
[CTFTime Index](https://ctftime.org/ctfs) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
#Reversing | ||
|
||
Reversing in the context of CTFs is usually the reverse engineering of software (executables/bin files) into assembly code and at times the original source to understand what is happening in a program, break a program (e.g. buffer overflows), or to decrypt encryptions done by a program. | ||
|
||
##Detection | ||
|
||
The easiest way to analyze a file for reversing is to use the `file` command in linux, which will tell you what any file is detected to be. For example most linux executables will be ELF files, while respective source files like `.c` or `.py` will be presented as their respective file-types. | ||
|
||
##Solution | ||
|
||
By far the most prominent tool for dealing with binaries is the tool [IDA](https://www.hex-rays.com/products/ida/). IDA is an extremely thorough tool which allows for a variety of interactions with binaries, but ultimately allows you to see the assembly for programs and how code blocks flow throughout a program. | ||
|
||
##Sources/See More | ||
|
||
[File command](https://unixhelp.ed.ac.uk/CGI/man-cgi?file) | ||
|
||
[IDA](https://www.hex-rays.com/products/ida/) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,6 @@ | ||
#Steganography | ||
|
||
Steganography [is the art or practice of concealing a message, image, or file within another message, image, or file](https://en.wikipedia.org/wiki/Steganography), and in the context of CTFs usually means finding the hints and flags that have been hidden with steganography. Most commonly a picture or image file will be given as a task with no further instructions, and the participants have to be able to uncover the message that has been encoded in the media. | ||
|
||
##Sources/See More | ||
[Steganography and Wikipedia](https://en.wikipedia.org/wiki/Steganography) |