You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: hands-on-practice.md
+6-2Lines changed: 6 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -7,22 +7,26 @@ description: >-
7
7
# Hands-on Practice
8
8
9
9
## **Capture The Flag (CTF)**
10
-
In **cybersecurity**, a **Capture The Flag (CTF)** is a **hands-on competition** designed to simulate real-world hacking scenarios. Participants—often **security professionals, ethical hackers, students, or red teams**—attempt to solve technical challenges that test their **offensive and defensive skills**.
10
+
In **cybersecurity**, a **Capture The Flag (CTF)** is a **hands-on competition** designed to simulate real-world hacking scenarios. Participant, who are often **security professionals, ethical hackers, students, or red teams**, attempt to solve technical challenges that test their **offensive and/or defensive skills**.
11
11
12
12
### **Types of CTF Competitions**
13
+
13
14
CTFs can vary in format but typically fall into three main categories:
15
+
14
16
1.**Jeopardy-Style** – Players solve challenges in categories like **cryptography, reverse engineering, web exploitation, and forensics** to earn points.
15
17
2.**Attack-Defense** – Teams defend their own systems while attacking others, simulating **real-world red vs. blue team scenarios**.
16
18
3.**Boot2Root / Puzzle-Based** – Participants must gain root access to a vulnerable machine or solve multi-step hacking challenges.
17
19
18
20
### **CTFs for Cyber Training**
21
+
19
22
For cybersecurity professionals, CTFs provide an opportunity to:
23
+
20
24
-**Practice offensive security** techniques like **privilege escalation, exploit development, and lateral movement**.
21
25
-**Learn real-world tactics** used by adversaries in penetration tests.
22
26
-**Improve technical agility** in areas like **reverse engineering malware, bypassing security controls, and social engineering**.
23
27
-**Enhance teamwork** in scenarios that mimic **cybercriminals** and **advanced persistent threats (APT)**.
24
28
25
-
CTFs are widely used for **cybersecurity education**, **hiring assessments**, and **upskilling professionals**. Many competitions, such as **DEFCON CTF, Hack The Box, and PicoCTF**, provide an immersive experience to sharpen security expertise.
29
+
CTFs are also widely used for **cybersecurity education**, **hiring assessments**, and **upskilling professionals**. Many competitions, such as **DEFCON CTF, Hack The Box, and PicoCTF**, provide an immersive experience to sharpen security expertise.
26
30
27
31
Here is a list of some of the more popular platforms for hands-on CTF training:
0 commit comments