Capture the Flag

Cybersecurity Insights with John Hammond: YouTube Legend and Security Researcher
Tom Eston | | AI in Cybercrime, Capture the Flag, Cyber Security, cyber threat, Cybercrime Trends, Cybersecurity, cybersecurity education, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, John Hammond, Just Hacking Training, Malware Analysis, online training, Podcast, Podcasts, Privacy, security, Security Researcher, Shared Security Podcast, Snyk Event, social engineering, technology, Web security, Weekly Edition, YouTube
In this episode, we welcome cybersecurity researcher and YouTube legend John Hammond. John shares insights from his career at Huntress and his popular YouTube channel, where he creates educational content on cybersecurity ...

Boss of the SOC: Capture-the-Flag as a Recruitment Tool
Splunk's Boss of the SOC (BOTS) exercise helps cybersecurity pros show off skills and also serves as a valuable recruiting tool ...
Security Boulevard

BSides Canberra 2021 – Sam’s ‘Oh My Pod: Lessons From Building One Of Australia’s Biggest CTFs’
Marc Handelman | | BSides Canberra, Capture the Flag, Conferences, ctf, Cyber Security, Information Security, Infosec Education, Privacy Education, Security BSides
Thanks to BSides Canberra for publishing their outstanding videos on the organization's YouTube channel. Enjoy! Permalink ...

PDF is Broken: a justCTF Challenge
Trail of Bits sponsored the recent justCTF competition, and our engineers helped craft several of the challenges, including D0cker, Go-fs, Pinata, Oracles, and 25519. In this post we’re going to cover another ...
Intel Hardware CTF Competitions Drive Innovation for Next-Gen Secure Computing Platforms
The concept of capture the flag competitions goes back hundreds of years from a military perspective, and it has become a staple of hacking and cybersecurity exercises. The basic concept pits teams ...

Typo 1: VulnHub CTF walkthrough (part 2)
Introduction In the previous article, Part 1 of this CTF, we were able to complete the following steps on the victim machine: Getting the target machine IP address by running the VM ...
Typo 1: VulnHub CTF walkthrough (part 1)
In this article, we will solve a Capture the Flag (CTF) challenge that was posted on the VulnHub website by an author named Akanksha Sachin Verma. As per the description given by ...
Source 1: VulnHub CTF walkthrough
In this article, we will solve a Capture the Flag (CTF) challenge that was posted on the VulnHub website by an author named darkstar7471. Per the description given by the author, this ...
PWNED 1: VulnHub CTF walkthrough
In this article, we will solve a Capture the Flag (CTF) challenge that was posted on the VulnHub website by an author named Ajs Walker. As per the description given by the ...

Hack the Box (HTB) machines walkthrough series — Cascade (part 2)
We’re continuing from Part 1 of this machine, where we carried out a lot of enumeration and decoding to gain shell access as the user s.smith while also recovering the user flag ...