Skip to main content

My First CTF Adventure

Overthewire is a website which offer wargames that help you learn and practice security concepts in the form of fun-filled games

Related image

My first game is Bandit .

What special about this Game?
              These game teach you basic Linux terminal usage and tricks ( using commands in a way you never even imagine ) and the best part is more you play more you learn

 Whether it is easy or hard to solve a challenge?
              To be honest,It is hard and makes you think out of the box but at the end you will fell i learned something cool.

Does this help me with Daily chores?
              Yes, knowing few tricks in command line can save tons of your time. let me give a example
you need to remove the duplicate line in Log file or find occurrence of line which can be done using single linux command. That's the power of command line apps.

Anything else i can do with learned knowledge?
             You can do lot. if you play lot of challenge you can improve your coding,thinking and how to approach problem.If you think , you are smart enough then participate in real time CTF challenge.you got more points then you can earn money and prizes

It's a Win-Win 

you can learn new stuff and make money
you can make career in cyber security ( if you are work delicately ) 

Categories in challenge?
            There are few categories in challenge
      • Binary Exploitation ( exploit the vulnerability in binary files)
      • Cryptography ( Encryption and decryption - beauty of math )
      • Forensics ( Analysis and collection data )
      • Reverse Engineering ( try to find how software works or programmed from low level i.e Assembly language )
      • Stenography ( The art of hiding data behind files )
      • Web security  ( exploiting the web vulnerabilities )
      • Networking ( exploiting the network )
Future Plan:

Alright The game is awesome what's next?
             I am very much interested to learn technology in a way through fun and challenge.Next i like to try other games such as Natas (Basic Websecurity challenge),Leviathan and lot more
  

Feel excited check the site:
http://overthewire.org/wargames/leviathan/




Comments

Popular posts from this blog

Docker

Docker is used to run software packages called "containers". Containers are isolated from each other and bundle their own tools, libraries and configuration files; they can communicate with each other through well-defined channels                                                                                                --Wikipedia  I have already written a article about the containers you can check out in here https://thangaayyanar.blogspot.com/2018/06/containers.html This time, let's learn more about docker engine how we can use this. The important things we need to know in docker are Docker Image:  The container can be created with the help of Image. The Image file consists of code, libraries, environment variable...

BlockChain

As the name says chain of block Now what is a block?       A block typically contains a  cryptographic hash of the previous block,  a timestamp transaction data    Where it is used?      It is the backbone of cryptocurrency i.e it ensure the security and integrity of data. The usage doesn't stop here well blockchain are resistant to modification of the data. so it can used in Bank Identity verification Hospital records and much more   How it ensures security and integrity of data? Block added to the chain, contain the hash ( result obtained from hash algorithm such as MD5,SHA) of the previous block so changes in one block lead to mismatch. Proof of work algorithm - Adding a node in the block chain require validation whether the new block is valid or not which is done my miner if they find the valid hash they will be rewarded How to do one?      The most interesting part ...

My experience in iOS Hackathon

This is my second hackathon, my first hackathon was on machine learning if you want to check out that article by following the below link https://thangaayyanar.blogspot.com/2018/02/what-i-learned-from-machine-learning.html So let's get started First let us discuss about the idea of what we are trying to achieve in this hackathon. From the above image you can able to know that we are going to recognize text from the image and use it to do find which field it is.  we separated this idea into three modules Identify the region Recognize the text  Field classification Module I : Identify the region To identify the selected region we used Vision framework ( ML framework provided by apple to detect the object ). The vision framework give us the boundary of the text region ( i.e frame - x,y,width,height ).  Then using the above region we crop the selected region and pass it to the next module. Module II : Recognize the text To recognize the text we ...