FAQ
A CTF, or Capture The Flag competition, is a cybersecurity competition where participants solve different challenges to uncover hidden ‘flags’ — secret strings of characters that prove they’ve cracked the problem. These challenges cover a wide range of cybersecurity topics, from web security and cryptography to reverse engineering and forensics. CTFs are designed to help you build real-world hacking skills in a safe, legal environment, making them a great way to learn, practice, and even compete with others in the cybersecurity community!
If you would like to participate in any of our activities, right now, we’ve got a Get In Touch section with a simple form. Just fill it out, and we’ll reach out as soon as our next beginner-friendly competition is on the horizon!
If you wish to contact us for any other reason, feel free to leave as an email at ctf.uvt@gmail.com
For a CTF, having some basic skills in areas like coding, web security, or understanding networks can be super helpful. Familiarity with topics like cryptography or Linux commands is a bonus too. But honestly, you don’t need to be an expert! A lot of people prefer to dive in head first and learn as they go, picking up new skills as they tackle each challenge. CTFs are all about problem-solving and creativity, so curiosity and persistence are your best tools. Plus, in our team, we also put a big emphasis on being able to cook!
We made a list for you. It doesn’t include ALL the possible jobs but covers the biggest and most popular ones:
Attack Roles
- Network Penetration Tester: Identifies and exploits vulnerabilities in network infrastructure, requiring strong networking and systems knowledge.
- Web Application Tester: Tests web applications for security flaws, with a focus on web vulnerabilities.
- Cloud Penetration Tester: Focuses on cloud infrastructure security, discovering and exploiting cloud-specific weaknesses.
- Exploit Developer: Crafts and deploys software exploits. This role is suited for those interested in reverse engineering and low-level code.
- Vulnerability Researcher: Researches software vulnerabilities and creates Proofs of Concept (PoCs) for exploits, ideal for those with reverse engineering skills.
- Red Team Operator: Conducts full-scope simulated attacks to test an organization’s defenses, requiring expertise in advanced attack tactics, social engineering, and lateral movement within networks.
- Malware Developer: Develops specialized malware for penetration testing and red team operations, with a focus on evading detection, bypassing defenses, and gaining persistence on targeted systems.
Defense Roles
- Security Administrator: Oversees security at an operational level across an organization, managing access controls, firewalls, and other protective measures.
- Cyber Defense Analyst: Monitors network security, investigating alerts for suspicious activity and escalating incidents as needed.
- Malware Analyst: Analyzes malware to determine its function, behavior, and potential impact, reverse engineering samples to understand their methods and mitigation strategies.
- Digital Forensics Analyst: Investigates cybersecurity incidents by gathering and analyzing digital evidence, reconstructing attack timelines, and preparing reports for incident response.
- Cyber Defense Incident Responder: Responds to cybersecurity incidents, containing and remediating threats, performing root cause analysis, and working in high-paced environments to mitigate damages.
- Threat Hunter: Proactively searches for Indicators of Compromise (IOCs) across systems, staying updated on new threats and searching for malicious activity that may evade standard detection measures.
We get this question a lot, so we made a list with many open-source resources to help you start your journey:
Pwn
- Learning: pwn.college Dojos
- Training: pwn.college Dojos, pwnable.xyz (easy), pwnable.kr (medium), pwnable.tw (hard)
Web
- Learning: PortSwigger Web Security Topics
- Training: webhacking.kr, Google Gruyere, websec.fr
Crypto
- Learning: CryptoHack Courses
- Training: CryptoHack Challenges
Reversing
- Learning: Reverse Engineering for Beginners - Dennis Yurichev (Reversing is a field that incorporates numerous subfields, so it’s very difficult to fully “prepare” for it.)
- Training: reversing.kr, challenges.re, crackmes.one
Forensics
- Learning: Digital Forensics Lab - GitHub
- Training: Root-Me Forensics Challenges, Root-Me Network Challenges