Skip to main content

CAPTURE THE FLAG(CTF)

What Is CTF?

Capture the flag

Types of CTF

CTF may conduct in two types:-

Types of CTFChallenges:

How To Get Started?

CTF list to Play and Practice now

Tips to Win CTF?

Tools And Resources

Resources:

Comments

Popular posts from this blog

How to Extract Informatiom from Mobile Numbers?

Before Enter into the blog a small Disclamier use this for Educational and Research Purposes only. Don’t do this for any illegal activity the creator is not responsible for your activity. Want to get information from Phone Number for OSINT Investigation. Use this to tool to extract information from phone numbers. This tool is completely developed with python. The source code of the program is also attached here(down). Here i use Google Cloud Console terminal you can use any other terminal also.  Go To  https://github.com/maari-krish/Phoneinfoga And then clone the Repository. Follow the Installing Steps which mentioned in github repository. And then enter the mobile number with country code. And then see the result. Your output will look like this. Here i hide the phone number for security purposes. You can open the gps location in your browser which it is precised location not the exact location of the number. We can use another tool also. Go to terminal and type for installat...

Extract Information From IP Address

Before Enter into the blog a small Disclamier use this for Educational and Research Purposes only. Don’t do this for any illegal activity the creator is not responsible for your activity. This is only for OSINT Investigation. There are several ways to get information about IP address. But this tool can give infomation about IP and detect the the IP is using VPN or Not. This tool is completely developed with python. Open Terminal, you can use google cloud console terminal also. Go to https://github.com/maari-krish/Ipinfoga Clone the Repository. Follow the Installing Steps which mentioned in github repository. Here i hide the IP. You please the enter the ip and move on.You can open the gps location in your browser which it is precised location not the exact location of the IP. To detect the IP is using vpn it is in different repository. But i combined the code and give it. Source code is given below. Go to https://github.com/maari-krish/Vpn-Detector Follow the steps given in the reposito...

SOCIAL ENGINEERING

  What is Social Engineering? Social engineering is the term used for a broad range of malicious activities accomplished through human interactions. Psychological manipulation of people into performing actions or divulging confidential information. Getting the required data by manipulating the human mind. Social Engineering Lifecycle InformationGathering Gather the required information to attack the target. use OSINT to gather information. Extracting information from google search. prioritize the information. verify the information. plan the attack. Establishing a Relationship with the target Engage with the target. create a story. Interact with the target. Exploitation Maintain the story. Extarct information . Exit Closes interaction. Cover tracks. Traits of Social Engineering Attacks Social engineering attacks center around the attacker’s use of persuasion and confidence. Heightened emotions  : Emotional manipulation gives attackers the upper hand in an any interaction.The f...