Skip to content

Commit

Permalink
Rewrote intro, crypto
Browse files Browse the repository at this point in the history
  • Loading branch information
cabreraalex committed May 21, 2014
1 parent 096e69b commit 67a64ec
Show file tree
Hide file tree
Showing 2 changed files with 32 additions and 11 deletions.
16 changes: 10 additions & 6 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,16 @@ This repository aims to be an archive of information, tools, and references rega

CTFs, especially for beginners, can be very daunting and almost impossible to approach. With some general overviews of common CTF subjects and more in-depth research and explanation in specific topics both beginners and veterans can learn, contribute, and collaborate to expand their knowledge.

##Quick Start

1. First time? Read down below to learn more about CTFs, and then use the resources in the [topics](./topics/) directory to try to solve challenges on websites like [OverTheWire](https://overthewire.org/wargames/) and later on [ctftime](https://ctftime.org/).

2. Beginner? Use the guides found in the [topics](./topics/) directory to try to find out what type of challenges you are presented with and participate in some of the CTFs presented on [ctftime](https://ctftime.org/).

3. Intermediate? Navigate straight to the topic you are interested in to find extra online resources to help you solve more complex challenges.

4. Master? Help improve this repository! Have a new type of vulnerability you want to explain? Write about it and how to use it! Have a new tool people can use? add it to the tools directory!

##What is a CTF?

CTFs are computer security/hacking competitions which generally consist of participants breaking, investigating, reverse engineering and doing anything they can to reach the end goal, a "flag" which is usually found as a string of text.
Expand All @@ -16,12 +26,6 @@ A very simple type of CTF challenge consists of looking at the source code of we

<!-- flag: 2_l33t_4_M3 -->

##Using These Docs

These docs are organized broadly along the lines by which CTF tasks are organized. Inside each folder in the topics section is a README like this one explaining the basics of the technology and what the tasks generally involve. Alongside these READMES are folders with more information regarding specific technologies and topics. Many of these articles link to the [tools folder](tools), where more detailed explanations can be found for tehcnologies used throughout CTF competitions.

The best way to use these docs is to participate in an actual CTF! Join a CTF or attempt some old tasks and try to solve them. Use the information in this repository to get you started with finding some flags. If you feel like there is insufficient information to help you solve a task, bring up an issue on this repository and someone can try to clarify it.

###Moving On

You may be able to solve some CTF challenges after looking through the documents in this repository and understanding the basics of the technologies and subjects covered, but you won't be very proficient or successful for long. To be an adept CTF competitor you have to be able to combine many different strategies and tools to find the flag. Developing the ability to find flags quickly takes practice more than anything, and participating in numerous CTFs will allow you to expand your understanding and abilities, leading you to success.
Expand Down
27 changes: 22 additions & 5 deletions topics/cryptography/README.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,27 @@
#Cryptography

> Cryptography is the practice and study of techniques for secure communication in the presence of third parties. - [Wikipedia](https://en.wikipedia.org/wiki/Cryptography)
##Quick Start

1. Is the text relatively small? a few sentences?

* Is the text 32 characters long? This is most likely an [md5](./md5/) hash

* Is it 40 characters long? Most likely a [SHA1](./sha1/) hash

* Are there equal signs spread out through the text and often next to each other? Probably a [base64](./base64/) encoded string

* Is the text only letters?

* Check if it is a [Caesar](./caesar-cipher/) or [Vigenere](./vigenere-cipher/) cipher

* Rarely, it may be a keyboard map as found in the [Olympic CTF 2014](https://github.com/ctfs/write-ups/tree/master/olympic-ctf-2014/crypting)

2. Any hints about keys? signing? most likely [RSA](./rsa/)


##About

> Cryptography is the practice and study of techniques for secure communication in the presence of third parties. - [Wikipedia](https://en.wikipedia.org/wiki/Cryptography)
In the case of CTFs, the goal is usually to crack or clone cryptographic objects or algorithms to reach the flag.

Expand All @@ -14,10 +35,6 @@ Hint: Julius Caesar's favorite cipher
kxn iye lbedec
```

##Getting Started

*To-Do*

##Sources/See More

[Introduction to Cryptography](https://www.cs.umd.edu/~waa/414-F11/IntroToCrypto.pdf)
Expand Down

0 comments on commit 67a64ec

Please sign in to comment.