Skip to content

Commit

Permalink
Added more README overviews
Browse files Browse the repository at this point in the history
  • Loading branch information
cabreraalex committed Mar 13, 2014
1 parent 4c621d2 commit 0f56d3e
Show file tree
Hide file tree
Showing 3 changed files with 39 additions and 0 deletions.
16 changes: 16 additions & 0 deletions miscellaneous/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
#Miscellaneous

Many challenges in CTFs will be completely random and unprecedented, requiring simply logic, knowledge, and patience to be solved. There is no sure-fire way to prepare for these, but as you complete more CTFs you will be able to recognize and hopefully have more clues as to how to solve them.

###Examples

In recent CTFs the sheer variety of miscellaneous tasks has been highly exemplified, for example:

* In the [Olympic CTF Sochi 2014](https://ctftime.org/event/130), there was [low-point miscellaneous challenge](https://github.com/ctfs/write-ups/tree/master/olympic-ctf-2014/crypting) which only provided a jumbled string of words. Instead of being a typical crypto challenge, the answer required competitors to draw out the word SOCHI on their keyboards.
* [RuCTF](https://ctftime.org/event/122) had a challenge which presented a [single picture of shredded strips of paper jumpled up in a random order](https://github.com/ctfs/write-ups/tree/master/ructf-2014-quals/misc-100). The best way of solving this was by hand! No computer knowledge was even needed for its completion.

##Sources/See More

[CTF Write-Ups](https://github.com/ctfs/write-ups)

[CTFTime Index](https://ctftime.org/ctfs)
17 changes: 17 additions & 0 deletions reversing/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
#Reversing

Reversing in the context of CTFs is usually the reverse engineering of software (executables/bin files) into assembly code and at times the original source to understand what is happening in a program, break a program (e.g. buffer overflows), or to decrypt encryptions done by a program.

##Detection

The easiest way to analyze a file for reversing is to use the `file` command in linux, which will tell you what any file is detected to be. For example most linux executables will be ELF files, while respective source files like `.c` or `.py` will be presented as their respective file-types.

##Solution

By far the most prominent tool for dealing with binaries is the tool [IDA](https://www.hex-rays.com/products/ida/). IDA is an extremely thorough tool which allows for a variety of interactions with binaries, but ultimately allows you to see the assembly for programs and how code blocks flow throughout a program.

##Sources/See More

[File command](https://unixhelp.ed.ac.uk/CGI/man-cgi?file)

[IDA](https://www.hex-rays.com/products/ida/)
6 changes: 6 additions & 0 deletions steganography/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
#Steganography

Steganography [is the art or practice of concealing a message, image, or file within another message, image, or file](https://en.wikipedia.org/wiki/Steganography), and in the context of CTFs usually means finding the hints and flags that have been hidden with steganography. Most commonly a picture or image file will be given as a task with no further instructions, and the participants have to be able to uncover the message that has been encoded in the media.

##Sources/See More
[Steganography and Wikipedia](https://en.wikipedia.org/wiki/Steganography)

0 comments on commit 0f56d3e

Please sign in to comment.